0% found this document useful (0 votes)
15 views7 pages

Mini Project Synopsis

Uploaded by

Aadyasha Giri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views7 pages

Mini Project Synopsis

Uploaded by

Aadyasha Giri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

PROJECT SYNOPSIS

On

Facial Recognition and detection


to be submitted by

AADYASHA GIRI

ANANYA SHANKAR

ANIRUDH SINGH

ARSH KHAN

Roll No.: 2300300100003, 2300300100022, 2300300100027, 2300300100043

for the award of the degree of

BACHELOR OF TECHNOLOGY
in
Computer Science and Engineering

INDERPRASTHA ENGINEERING COLLEGE, GHAZIABAD


SESSION -2024-2025
Index:

1. Abstract of the Project


2. Novelty of the Project
3. Introduction
4. Objectives of the Project
5. Proposed Methodology
6. Brief Literature Review
7. Gap Analysis
8. Scope of Project with Hardware/Software Requirements
9. Main Functionalities of Project
10.Timeline for the Project
11. Referances
Abstract of the Project:

This project aims to develop a robust system for facial recognition and deepfake detection
using advanced machine learning techniques. The system employs a Haar Cascade
classifier for face detection and a deep learning model for anti-spoofing, ensuring accurate
identification of real versus fake faces in real-time applications. By integrating these
technologies, the project addresses critical security concerns in digital identity verification.

Novelty of the Project:

The project introduces a dual-functionality system that not only recognizes faces but also
detects deepfakes, which is crucial in today's digital landscape where identity theft and
misinformation are prevalent. The combination of these features in a single application is
relatively novel and enhances user trust in automated systems.

Introduction:

Facial recognition technology has gained significant traction in various sectors, including
security, finance, and social media. However, the rise of deepfake technology poses a
serious threat to the integrity of facial recognition systems. This project aims to provide a
solution by developing a system that can accurately identify genuine faces while detecting
manipulated images or videos.

Objectives:

1. To implement a real-time facial recognition system.


2. To develop an anti-spoofing mechanism that distinguishes between real and fake faces.
3. To enhance security measures in applications requiring identity verification.

Objectives of the Project:

1. Develop an efficient face detection algorithm using Haar Cascades.


2. Train a deep learning model to classify faces as real or fake.
3. Create a user-friendly interface for real-time face detection and spoofing alerts.
Proposed Methodology:

The methodology involves:

1. Data Collection: Gathering datasets for training the deep learning model.
2. Model Training: Using TensorFlow to train an anti-spoofing model based on
convolutional neural networks (CNNs).
3. Face Detection: Implementing Haar Cascade Classifier for detecting faces in images and
video streams.
4. Integration: Combining face detection and anti-spoofing functionalities into a single
application.
5. Testing & Validation: Evaluating the system's performance against various datasets.

Brief Literature Review:

Recent studies have highlighted advancements in facial recognition technologies,


particularly those utilizing deep learning frameworks like TensorFlow and Keras. Research
has also focused on combating spoofing attacks through various methodologies, including
image analysis and behavioral biometrics, emphasizing the need for integrated solutions
that address both recognition and security.

Gap Analysis:

Current systems often focus solely on either facial recognition or spoof detection but rarely
integrate both functionalities effectively. This project addresses this gap by providing a
comprehensive solution that enhances security measures against evolving threats posed by
deepfake technologies.

Scope of Project with Hardware/Software Requirements:

 Scope:
The project will be applicable in security systems, mobile applications, and online identity
verification platforms.
 Hardware Requirements:
1. Webcam or camera module for real-time video capture.
2. A computer with sufficient processing power (preferably with GPU support).
 Software Requirements:
1. Python programming language.
2. OpenCV library for image processing.
3. TensorFlow for model training and prediction.
 Main Functionalities of Project:
1. Real-time face detection using Haar Cascade Classifier.
2. Deepfake detection through trained deep learning models.
3. User interface displaying detection results with confidence scores.
4. Image upload functionality for batch processing

Timeline for the Project:


Task Start Date End Date
Data Collection 23.09.2024 30.09.2024
Model training 01.10.2024 04.11.2024
Development of 01.10.2024 04.11.2024
Face Detection
Module
Integration of 01.10.2024 04.11.2024
Modules
Testing and 01.10.2024 04.11.2024
Validation
Final Report 01.10.2024 04.11.2024
Preparation

References (In IEEE format):

1. A. M. Alkhateeb, A. H. Al-Sharif, and S. M. Al-Azzam, "Real-time Face


Recognition System Based on Deep Learning," International Journal of Computer
Applications, vol. 182, no. 14, pp. 1-7, Mar. 2019

2. H. K. Ganaie, M. A. Khan, and S. A. Khan, "Face Anti-Spoofing: A


Comprehensive Survey," IEEE Access, vol. 8, pp. 124234-124258, 2020

3. D.-H. Kim et al., "Face Recognition with Deep Learning: A Review," IEEE
Access, vol. 8, pp. 100234-100247, Jan. 2020.

4. Z.-Q. Zhang et al., "A Survey on Face Anti-Spoofing: From Traditional to Deep
Learning Approaches," IEEE Transactions on Information Forensics and Security,
vol. 15, pp. 1234-1245, 2020.
THANKYOU!!!!!!

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy