Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
314 views

Ecrime Identification Using Face Matching Based Using PHP

The document provides an overview of a criminal identification project that uses video camera footage to identify criminals by comparing captured images to images stored in a database. It analyzes faces using Haar cascade classification and principal component analysis with eigenfaces. The project aims to identify criminals in public places like airports and trains. It describes the hardware, software and features used to build the system, including a PHP and MySQL backend.

Uploaded by

LogaNathan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
314 views

Ecrime Identification Using Face Matching Based Using PHP

The document provides an overview of a criminal identification project that uses video camera footage to identify criminals by comparing captured images to images stored in a database. It analyzes faces using Haar cascade classification and principal component analysis with eigenfaces. The project aims to identify criminals in public places like airports and trains. It describes the hardware, software and features used to build the system, including a PHP and MySQL backend.

Uploaded by

LogaNathan
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

INTRODUCTION

1.1 OVERVIEW OF PROJECT


This web application is going to identify criminals at various security place such as
airport, railway etc. Video Camera captures a fixed number of frames of a person coming in front
of check in counter. Proposed system compares these captured images taken through the camera
with the images of the criminals which are stored in the database. Proposed system is connection
of two stages – Face detection using Haar Based Cascade classifier and recognition using
Principle Component analysis with Eigen Face. The goal is to implement the system (model) for
a particular face and distinguish it from a large number of stored faces with some real-time
variations as well.

1.1.1 PROBLEM DEFINETION:


These features are then used to search for other images with matching features. Other
algorithms normalize a gallery of face images and then compress the face data, only saving the
data in the image that is useful for face detection. A probe image is then compared with the face
data. One of the earliest successful systems is based on template matching techniques applied to
a set of salient facial features, providing a sort of compressed face representation. Recognition
algorithms can be divided into two main approaches, geometric, which looks at distinguishing
features, or photometric, which is a statistical approach that distill an image into values and
comparing the values with templates to eliminate variances.

1.1.2 PROJECT DESCRIPTION


The automatically tagging feature adds a new dimension to sharing pictures among the
people who are in the picture and also gives the idea to other people about who the person is in
the image. In our project, we have studied and implemented a pretty simple but very effective
face detection algorithm which takes human skin color into account. Our aim, which we believe
we have reached, was to develop a system that can be used by police or investigation department
to recognize criminal from their faces. The method of face recognition used is fast, robust,
reasonably simple and accurate with a relatively simple and easy to understand algorithms and
technique. The system is going to identify criminals at various security place such as airport,
railway etc. Video Camera captures a fixed number of frames of a person coming in front of
check in counter. Proposed system compares these captured images taken through the camera
with the images of the criminals which are stored in the database. Proposed system is connection
of two stages – Face detection using Haar Based Cascade classifier and recognition using
Principle Component analysis with Eigen Face. The goal is to implement the system (model) for
a particular face and distinguish it from a large number of stored faces with some real-time
variations as well.
1.2 ORGANIZATION PROFILE
Neelavath Software Solutions in Coimbatore provide web designs in coimbatore at
efficient, optimized and easy to read format across a variety of devices and web browsers.
Our authentic Website Development Service will be designed more adaptive to the media that
resides them. Neelavath take immense proud in stating that, we render excellent User Interface
and User Experience(UI/UX) Designs for various business domains and across all various
verticals in Coimbatore, TamilNadu, India. Building an E-commerce website is not easy but we
Neelavath Software Solutions have been executing E-commerce web development in
Coimbatore with great success for clients globally and we can do the same for you as well. We
are one of the top brands for WordPress development services in Coimbatore and have
completed several high performance projects in the niche. We have considerable experience
developing small blogging sites to large complex WP-based websites. Logo is something that
reciprocates your identity. We offer authentic Logo designs in Coimbatore, which acts as an
attraction. We will work together to create a cohesive logo that describes your brand.

We Neelavath Web Designing company in coimbatore provides very innovative and


creative Websites in the Industry. Our Software Development firm in Coimbatore has best and
innovative website developers who are experienced in Web languages like PHP, Python, Java,
Dotnet. We use HTML, CSS, Javascript, ReactJs, VueJs, ExpressJs, NodeJs in frontend as user
Interface Languages. We create websites and connect with databases like MySql, Postgres,
MangoDB, Firebase. We provide Free Hosting services for one year with Amazon Web Service.

We Neelavath Softwares, a top-notch website designing company and premium web


development company in Coimbatore, provide complete web design services that are affordable,
best in quality, and result oriented. We furnish custom web solutions that focus on quality,
innovation, and speed. We are specialized in mobile responsive websites, WordPress CMS web
designing services, eCommerce website designing and development, active static websites, data-
driven dynamic websites, portal web development, multimedia and flash style websites, open
source web development services, SEO services, SEO optimized web designing, conversion rate
optimization, and landing page optimization.
Website Designing
Website design is an important matter and should not be taken lightly. A well-designed
website can help you form a good impression on your prospective customers. It can also help
you nurture your leads and get more conversions. But, more importantly, it provides good user
experience and helps your website visitors access and navigate your website with ease.

Website Development
Web development and design help to promote a company’s brand name. Essentially, if a
firm’s website is accessible via the World Wide Web, the company is considered operating on a
worldwide scale. This means that a little-known company may be looked for, and its items can
be delivered to clients who are far away. These are the minor details that help a business win the
confidence and trust of its customers. Profits and revenues rise as a result of this development

Hosting Services
A fast website offers a better user experience overall for the user, which is imperative to
how they feel about your site and your business.It is common knowledge that a site with poor
web hosting is likely to suffer issues because the host will not protect the website.Hosting with a
secure IP address and good web hosting company means you are on your way to enabling
HTTPS on your site. This offers a more secure site where sensitive information is protected.

Our Mission
To deliver a digital solution which optimizes client's business. We grow with the growth
of our clients, employees and other stackholders.

Our Vision
Create a digital world which has its digital product showcase with creative web solutions.

Our Goal
Showcase our innovative Website development strategies with our client who are looking
for website designs in coimbatore.
1.3 SYSTEM SPECIFICATION
1.3.1 HARDWARE CONFIGURATION
SYSTEM NAME : HP
PROCESSOR : INTEL CORE i3
CPU SPEED : 3.10GHz
CACHE MEMORY : 1024K
HARD DISK : 512 GB
RAM : 4 GB
MONITOR : HP 18.5 “LED MONITOR”
KEYBOARD : HP (107 KEYS)
MOUSE : HP (3 OPTICAL BUTTONS)

1.3.2 SOFTWARE SPECIFICATION


OPERATIONAL SYSTEM : WINDOWS 10
FRONT END : HTML, CSS, JavaScript, Bootstrap
FRONT END(CODING) : PHP(Hypertext Pre Processor)
BACK END : MYSQL
SERVER : XAMPP
1.3.2.1 FEATURES OF PHP:
The combination of PHP and MySQL is the most convenient approach to dynamic,
database- driven web design, holding its own in the face of challenges from integrated
frameworks— such as Ruby on Rails—that are harder to learn. Due to its open source roots
(unlike the competing Microsoft .NET Framework), it is free to implement and is therefore an
extremely popular option for web development. At its most basic level, the request/response
process consists of a web browser asking the web server to send it a web page and the server
sending back the page. The browser then takes care of displaying the page.

(The basic client/server request/response sequence)


Each step in the request and response sequence is as follows:
1. You enter http://server.com into your browser’s address bar.
2. Your browser looks up the IP address for server.com.
3. Your browser issues a request for the home page at server.com.
4. The request crosses the Internet and arrives at the server.com web server.
5. The web server, having received the request, looks for the web page on its disk.
6. The web page is retrieved by the server and returned to the browser.
7. Your browser displays the web page.
For dynamic web pages, the procedure is a little more involved, because it may bring both PHP
and MySQL into the mix.

1. You enter http://server.com into your browser’s address bar.


2. Your browser looks up the IP address for server.com.
3. Your browser issues a request to that address for the web server’s home page.
4. The request crosses the Internet and arrives at the server.com web server.
5. The web server, having received the request, fetches the home page from its hard disk.
6. With the home page now in memory, the web server notices that it is a file incorporating
PHP scripting and passes the page to the PHP interpreter.
7. The PHP interpreter executes the PHP code.
8. Some of the PHP contains MySQL statements, which the PHP interpreter now passes to
the MySQL database engine.
9. The MySQL database returns the results of the statements to the PHP interpreter.
10. The PHP interpreter returns the results of the executed PHP code, along with the results
from the MySQL database, to the web server.
11. The web server returns the page to the requesting client, which displays it.

HISTORY OF PHP:
PHP is an open-source, interpreted, and object-oriented scripting language that can be
executed at the server-side. PHP is well suited for web development. Therefore, it is used to
develop web applications (an application that executes on the server and generates the dynamic
page.). PHP was created by Rasmus Lerdorf in 1994 but appeared in the market in 1995. PHP
8.2.0 is the latest version of PHP, which was released on 28 December 2022.

Some important points need to be noticed about PHP are as followed:


 PHP stands for Hypertext Preprocessor.
 PHP is an interpreted language, i.e., there is no need for compilation.
 PHP is faster than other scripting languages, for example, ASP and JSP.
 PHP is a server-side scripting language, which is used to manage the dynamic content of
the website.
 PHP can be embedded into HTML.
 PHP is an object-oriented language.
 PHP is an open-source scripting language.
 PHP is simple and easy to learn language.

WHY USE PHP:


 PHP is a server-side scripting language, which is used to design the dynamic web
applications with MySQL database.
 It handles dynamic content, database as well as session tracking for the website.
 You can create sessions in PHP.
 It can access cookies variable and also set cookies.
 It helps to encrypt the data and apply validation.
 PHP supports several protocols such as HTTP, POP3, SNMP, LDAP, IMAP, and many
more.
 Using PHP language, you can control the user to access some pages of your website.
 As PHP is easy to install and set up, this is the main reason why PHP is the best language
to learn.
 PHP can handle the forms, such as - collect the data from users using forms, save it into
the database, and return useful information to the user. For example - Registration form.

ATTRIBUTES OF PHP:
PHP is very popular language because of its simplicity and open source. There are some
important features of PHP given below:
Performance: PHP script is executed much faster than those scripts which are written in other
languages such as JSP and ASP. PHP uses its own memory, so the server workload and loading
time is automatically reduced, which results in faster processing speed and better performance.
Open Source: PHP source code and software are freely available on the web. You can develop
all the versions of PHP according to your requirement without paying any cost. All its
components are free to download and use.
Familiarity with syntax: PHP has easily understandable syntax. Programmers are comfortable
coding with it.
Embedded: PHP code can be easily embedded within HTML tags and script.
Platform Independent: PHP is available for WINDOWS, MAC, LINUX & UNIX operating
system. A PHP application developed in one OS can be easily executed in other OS also.
Database Support: PHP supports all the leading databases such as MySQL, SQLite, ODBC,
etc.
Error Reporting: PHP has predefined error reporting constants to generate an error notice or
warning at runtime. E.g., E_ERROR, E_WARNING, E_STRICT, E_PARSE.
Loosely Typed Language: PHP allows us to use a variable without declaring its data type. It
will be taken automatically at the time of execution based on the type of data it contains on its
value.
Web servers Support: PHP is compatible with almost all local servers used today like Apache,
Netscape, Microsoft IIS, etc.
Security: PHP is a secure language to develop the website. It consists of multiple layers of
security to prevent threads and malicious attacks.
Control: Different programming languages require long script or code, whereas PHP can do the
same work in a few lines of code. It has maximum control over the websites like you can make
changes easily whenever you want.
1.3.2.2 FEATURES OF MySQL
MySQL is an open-source relational database management system (RDBMS) that is
widely used for building and managing databases. It is a crucial component in many web
applications, providing a robust and scalable solution for storing, organizing, and retrieving data.
MySQL is known for its reliability, performance, and ease of use.

Here are some key aspects of MySQL:

Relational Database Management System (RDBMS): MySQL follows the relational database
model, organizing data into tables with rows and columns. This structure allows for efficient
storage and retrieval of information.
Open Source: MySQL is an open-source software, which means that its source code is freely
available and can be modified and redistributed by the community. This has contributed to its
widespread adoption and continuous improvement.
Structured Query Language (SQL): MySQL uses SQL, a standard language for managing
relational databases. SQL allows users to define and manipulate the structure of the database, as
well as perform various operations such as data retrieval, insertion, updating, and deletion.
Multi-User and Multi-Threaded: MySQL supports multiple users accessing the database
concurrently, making it suitable for applications with a large number of users. It also employs
multi-threading to handle multiple tasks simultaneously, enhancing performance.
Data Security: MySQL provides robust security features, including user authentication, access
control, and encryption. This ensures that only authorized users can access and modify the
database, protecting sensitive information.
Cross-Platform Compatibility: MySQL is compatible with various operating systems,
including Windows, Linux, macOS, and more. This flexibility allows developers to deploy
MySQL in different environments based on their needs.
Scalability: MySQL is designed to scale from small applications to large, enterprise-level
systems. Its architecture supports replication, clustering, and other features that enable the
database to handle increased loads and data volumes.
Community Support: As an open-source project, MySQL benefits from a large and active
community of developers and users. This community provides support, documentation, and
continuous improvement through updates and patches.
Storage Engines: MySQL supports different storage engines, each with its own characteristics
and features. InnoDB and MyISAM are two popular storage engines, with InnoDB being the
default engine for MySQL as of version 5.5.
Administration Tools: MySQL comes with a set of tools for database administration, including
MySQL Workbench, a graphical tool for designing, modeling, and administering databases, and
command-line utilities for tasks such as importing and exporting data.

PROS AND CONS OF MYSQL:


Pros:
 Open Source: MySQL is open-source, meaning it is freely available for use,
modification, and distribution. This has led to a large and active community, fostering
continuous development and improvement.
 Reliability and Performance: MySQL is known for its reliability and performance. It can
handle large amounts of data and concurrent users efficiently, making it suitable for a
wide range of applications.
 Ease of Use: MySQL is relatively easy to set up and use, especially for beginners. It has a
straightforward syntax for SQL queries and provides user-friendly tools like MySQL
Workbench for database management.

 Cross-Platform Compatibility: MySQL is compatible with various operating systems,


including Windows, Linux, and macOS. This flexibility allows developers to deploy
MySQL in diverse environments.
 Scalability: MySQL is designed to scale from small applications to large, enterprise-level
systems. It supports features like replication and clustering to handle increased loads and
data volumes.
 Community Support: The MySQL community is extensive and active, providing forums,
documentation, and support. This can be valuable for developers seeking assistance or
looking for solutions to common issues.
 ACID Compliance: MySQL follows the ACID (Atomicity, Consistency, Isolation,
Durability) properties, ensuring data integrity and reliability in transactions.
 Storage Engine Options: MySQL supports multiple storage engines, allowing users to
choose the one that best fits their requirements. InnoDB, for example, provides features
like transactions and foreign key support.
 Security Features: MySQL offers robust security features, including user authentication,
access control, and data encryption, to protect sensitive information.
 Cost-Effective: Being open-source, MySQL is a cost-effective solution for many
businesses, as it eliminates the need for expensive licensing fees associated with some
proprietary databases.

Cons:

 Limited Support for NoSQL Features: MySQL is primarily a relational database


management system, and while it has made strides in supporting NoSQL features, it may
not be as feature-rich in this area as some dedicated NoSQL databases.
 Complex Configurations for High Availability: Setting up and configuring high
availability features like replication and clustering can be complex, especially for users
with limited experience.
 Default Storage Engine Choice: While MySQL supports multiple storage engines, the
default engine (InnoDB) may not always be the best choice for every use case. Choosing
the right storage engine requires careful consideration of specific requirements.
 Lack of Some Advanced Features: Some advanced features found in other database
systems might be missing in MySQL. Users with specific needs may need to consider
other database solutions that better cater to those requirements.
 Performance Tuning Challenges: Achieving optimal performance may require fine-tuning
configurations, and it may not always be straightforward for users without a deep
understanding of MySQL internals.
 Ownership Changes: MySQL was initially developed by MySQL AB, which was later
acquired by Sun Microsystems, and subsequently by Oracle Corporation. Some users
may have concerns about the direction and influence of a corporate entity in the
development of an open-source project.
 Concurrency Limitations: While MySQL is generally good at handling concurrent
connections, extreme levels of concurrent read and write operations may lead to
performance issues.
 Strict Schema: While the structured nature of MySQL is an advantage for many use
cases, it can be a limitation for applications that require flexible and dynamic schemas.
2. SYSTEM STUDY

System analysis is defined as the process of gathering and interpreting facts,


diagnosing problems and using the factors to improve the system. The objectives of the system
analysis phase is the establishment of the requirement for the system to be acquired, developed
and installed facts finding or gathering is essential to any analysis of requirements.

2.1 EXISTING SYSTEM


The development of face identification over the past years allows an organization into
three types of identification algorithms, viz., frontal, profile and view tolerant identification,
depending on the kind of imagery and the according identification algorithms. While frontal
identification is certainly the classical approach, view-tolerant algorithms usually perform
identification in a more sophisticated fashion by taking into consideration some of the underlying
physics, geometry and statistics. Profile schemes as stand alone systems have a rather marginal
significance for identification. However, they are very practical either for fast course pre-
searches of large face databases to reduce the computational load for a subsequent sophisticated
algorithm, or as a part of hybrid identification scheme. Firstly the various characteristics of faces
are considered. Secondly, recent research activities in the identification and synthesis of face
images are outlined. Thirdly the applications of digital processing methods of facial information
are discussed from several standpoints: Intelligent image coding, media handling, human
computer interaction, caricature, facial impression and psychological and medical applications.

2.1.1 DRAWBACKS
 The problem with the present system is same as problems encountered in any digital file
processing system.
 The existing system does not support the cropped images of criminals.
 The existing system is not suitable in some cases such as if a witness can identify only a
part of the criminal.
 Present system uses some algorithms for identifying criminal faces which are difficult to
process.
 Finally the existing system does not always produce better results in identifying the
criminals by their images.

2.2 PROPOSED SYSTEM


Criminals identification using face recognition based mobile app to search and identify
criminal details. In the existing system finding the criminal and identify the background data is
diffcuilt, which leads to time taking process and lack of accurcy. The proposed mobile
applications contains criminal details such as name, case no, photo and etc. Police will manage
all criminal details in the application so that one other police can search and verify it. Police shall
upload photo of the criminal and search to get criminal details easily through mobile or web app.
The automatically tagging feature adds a new dimension to sharing pictures among the people
who are in the picture and also gives the idea to other people about who the person is in the
image. In our project, we have studied and implemented a pretty simple but very effective face
detection algorithm which takes human skin color into account. Our aim, which we believe we
have reached, was to develop a system that can be used by police or investigation department to
recognize criminal from their faces. The method of face recognition used is fast, robust,
reasonably simple and accurate with a relatively simple and easy to understand algorithms and
technique.

2.2.1 FEATURES
 Detection &conviction of criminals by ecriminal Identification Using Face Matching
Based Mobile App
 Computerize the attempt of taking complaints and records and establishing a
communication gateway among other police stations
 Transfering the cases or compalints to appropriate police stations by its id & locality
 Update the case details timely to ensure that fast action strategy is applied
 Provide the flexiblity to victims to register a company at any police station nearest,
neverthless the locality of crime.
 Provide a complaint id to victims to track their complaint details timely.
2.3 FEASIBILITY STUDY
A feasibility study is a test of a system proposal according to its workability, impact on
the organization, ability to meet user needs and effective use of resources. It is a high capsule
version of the entire system analysis and design process. The objective of the feasibility analysis
is to determine whether the proposed system is feasible.
There are four aspect of the feasibility analysis to which proposed system subjected to
the details are discussed below:

 Economical feasibility
 Technical feasibility
 Operational feasibility

2.3.1 ECONOMICAL FEASIBILITY


Economic feasibility is one of the most important aspects in the planning of a SHP-
project. An SHP project generates revenue throughout its lifetime, although it requires
substantial recurring investment too. Thus it is quite vital to perform economic and financial
analysis. A project would be feasible financially if receipts over the project lifetime are more
than the disbursements. In addition to the economic feasibility, the economic analysis also
provides a basis for comparison of possible alternatives for achieving the intended benefits from
a project. It allows the selection of the most expedient among the available alternative solutions,
which has the lowest cost associated with it. In this way, economic analysis acts as an important
decision tool in establishing an SHP project. Economic and financial analysis is quite essential to
know the economic feasibility of a project. In fact, there is some difference between economic
and financial analysis. Economic analysis implies the quantitative assessment of the economic
feasibility of an SHP project that includes a detailed comparison of benefits and costs associated
with the project during its lifetime, whereas financial analysis deals with quantitative evaluation
of the competence of the project to recoup the investments on the basis of self-liquidation. In
order to get ample funds to execute an SHP project, a financial analysis has to be carried out,
which confirms its commercial viability.
2.3.2 TECHNICAL FEASIBILITY
Technical feasibility evaluates the technical complexity of the expert system and often
involves determining whether the expert system can be implemented with state-of-the-art
techniques and tools. In the case of expert systems, an important aspect of technical feasibility is
determining the shell in which the system will be developed. The shell used to develop an expert
system can be an important determinant to its quality and makes it vital to the system's success.
Although the desirable characteristics of an expert system shell will depend on the task and
domain requirements, the shell must be flexible enough to build expert reasoning into the system
effectively. It must also be easily integrated with existing computer-based systems. Furthermore,
a shell providing a user-friendly interface encourages end users to use the system more
frequently.
The availability of technology like PHP and MYSQL has helped for developing the
software and implementing if in the concern. Since, the applications are user friendly. The
development of the software becomes easier and technically feasible.

2.3.3 OPERATIONAL FEASIBILITY


Operational feasibility is dependent on human resources available for the project and
involves projecting whether the system will be used if it is developed and implemented.
Operational feasibility is a measure of how well a proposed system solves the problems, and
takes advantage of the opportunities identified during scope definition and how it satisfies the
requirements identified in the requirements analysis phase of system development. Operational
feasibility reviews the willingness of the organization to support the proposed system. This is
probably the most difficult of the feasibilities to gauge. In order to determine this feasibility, it is
important to understand the management commitment to the proposed project. If the request was
initiated by management, it is likely that there is management support and the system will be
accepted and used. However, it is also important that the employee base will be accepting of the
change.

You might also like