0% found this document useful (0 votes)
137 views7 pages

Facetec: A Efficient Face Recognition in Mobiles For Theft Detection

This document is a project design report for an app called Facetec that uses face recognition on mobile devices to detect theft. The app aims to utilize optimized algorithms and face recognition techniques to detect unauthorized use of a mobile phone and send an automated message to the owner. It will use local directional pattern descriptors and two-dimensional principal component analysis algorithms for enhanced face recognition accuracy on mobile. The document outlines the data flow diagrams and use case diagram for the app's design and implementation.

Uploaded by

AshishKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views7 pages

Facetec: A Efficient Face Recognition in Mobiles For Theft Detection

This document is a project design report for an app called Facetec that uses face recognition on mobile devices to detect theft. The app aims to utilize optimized algorithms and face recognition techniques to detect unauthorized use of a mobile phone and send an automated message to the owner. It will use local directional pattern descriptors and two-dimensional principal component analysis algorithms for enhanced face recognition accuracy on mobile. The document outlines the data flow diagrams and use case diagram for the app's design and implementation.

Uploaded by

AshishKumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

i

PROJECT DESIGN REPORT


ON
FACETEC: A EFFICIENT FACE RECOGNITION IN
MOBILES FOR THEFT DETECTION




Submitted by

Ashish S Kumar (11409008)
Sreedevi S (11409050)
Dhanya A D (11409058)
Prayaga T K (11409042)


DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
MOHANDAS COLLEGE OF ENGINEERING AND
TECHNOLOGY
ANAD, NEDUMANGAD
THIRUVANANTHAPURAM-695544

ii

MOHANDAS COLLEGE OF ENGINEERING
AND TECHNOLOGY
ANAD, NEDUMANGAD
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING



CERTIFICATE

This is to certify that the bonafide report of project design done by
ASHISH S KUMAR (11 409 008) of Computer Science and Engineering in
partial fulfillment of the requirement for the award of the Degree of
B-Tech in Computer Science and Engineering of University of Kerala during
the academic year 2014-2015.


Project Guide Project Coordinator HOD of CSE



Place: Anad
Date:




iii

ACKNOWLEDGEMENT

We would like to express our heartfelt gratitude to our respected Director
Dr. Ashalatha Thampuran and Principal Dr. Ibrahimkutty who have encouraged and
inspired us throughout our course of study in this college. We would also like to thank
Prof. Gangadharan K, Head of Department, Department of Computer Science and
Engineering for providing all the resources and supporting us in every way.
I have taken efforts in this project. However, it would not have been possible without
the kind support and help of many individuals and organizations. I would like to extend my
sincere thanks to all of them.
I am highly indebted to Mrs. Thamizharasi A, Assistant Professor, Department of
Computer Science and Engineering, for their guidance and constant supervision as well as for
providing necessary information regarding the project & also for their support in completing
the project.

I would like to express my gratitude towards my parents & staff members of
Mohandas college of Engineering and Technology for their kind co-operation and
encouragement which help me in completion of this project.

My thanks and appreciations also go to my friends in developing the project and
people who have willingly helped me out with their abilities.



DATE:
iv











ABSTRACT


















v


ABSTRACT


This project aims at utilizing the face recognition technique utilized in mobile phones
to detect and send an automated message to the utilizer about the unauthorized utilization of
the mobile phone. Untill now there is no such application in mobile phones that detects a
larceny. The application currently available only aims at detecting faces and sanctioning
persons. This project is aiming at engendering an incipient application that will detect
larceny and will take the obligatory steps in an efficient manner utilizing optimized
algorithms. Automatic face recognition in unconstrained environments is a challenging task.
Most face recognition algorithms rely on one or more of three types of features: local binary
patterns, Gabor wavelet responses including Gabor phases, and color information. This
project represents the face recognition approach that employs the local directional pattern
descriptor and two-dimensional principal analysis algorithms to achieve enhanced
recognition accuracy. It utilizes the transformed image obtained from local directional
pattern descriptor as the direct input image of two-dimensional principal analysis
algorithms, unlike that most of previous works employed the local pattern descriptors to
acquire the histogram features. Additionally, we assess the usability of the algorithms in
mobile devices with limited resources.





vi


LIST OF FIGURES

Sl. No. Diagram Page no.

Fig 1. DFD for FACETEC (level 0) 12
Fig 2. DFD for initial configurations (level 1) 13
Fig 3. DFD for authentication process (level 1) 14
Fig 4. UCD for User 16
























vii


LIST OF ABBREVIATION


LDP Local directional Patterns
2D-PCA 2 dimensional principal component analysis
SDK Software Development kit
DFD Data flow Diagram
IDE Integrated development Environment
UCD Use case Diagram
DB Database
EP Evolutionary Pursuit
LBP Local Binary Patterns
HMM Hidden Markov Models
EBGM Elastic Bunch Graph Matching

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy