Face Detection and Recognition For Criminal
Face Detection and Recognition For Criminal
Abstract—Face detection and recognition have become investigations and highlighted its potential for identifying
essential tools in criminal identification and investigation. Face suspects and linking criminal activ ities. It used a large-scale
detection involves identifying individuals by comparing their dataset of criminal mugshots and achieved high accuracy in
facial features to a database of known faces. In criminal identifying criminals using deep learning techniques. They
identification, face detection and recognition are used to also discussed the potential applications of facial recognition
identify suspects and match them to surveillance footage or technology in other areas of law enforcement, such as border
images from crime scenes. It has the potential to significantly control and counterterrorism [1].
improve the accuracy and speed of criminal investigations and
to increase public safety by enabling law enforcement to Turk, M., & Pentland, A. evaluate the use of biometric
identify and apprehend dangerous criminals more quickly. technology, including facial recognition, in the criminal
However, the use of face detection and recognition technology justice system. They discussed the potential benefits of facial
also raises ethical and privacy concerns, as it can potentially be recognition technology, such as increased efficiency in
used to track individuals without their consent or to identifying suspects and solving crimes, as well as the
discriminate against certain groups. It is therefore important potential risks, such as privacy violations and bias. It
to use these tools responsibly and transparently and to ensure highlighted the importance of data quality and diversity in
that appropriate safeguards are in place to protect individual
facial recognition algorithms, as well as the need for
rights and freedoms. transparency and accountability in their use[16]. They also
Keywords— Face detection, Face recognition, Open-CV, discussed the potential biases in facial recognition algorithms
Image processing. and the need for rigorous testing and validation to ensure
their accuracy and fairness face detection and recognition
I. INT RODUCT ION technologies have significant potential for criminal
identification and surveillance. Further research is needed to
Facial recognition technology has become increasingly
develop robust facial recognition algorithms that can
popular in recent years, especially in the criminal justice
overcome the limitations of low-quality images and biased
system. It has the potential to revolutionize the way we
training data and to establish ethical guidelines for
identify and track criminals, improving the efficiency and
identification[2][3].
accuracy of investigations. Facial recognition technology
works by analyzing images or videos to identify individuals Ahonen, T., Hadid, A., & Pietikainen, M. trace the
based on their facial features. It can be used for a variety of evolution of face detection and recognition technology, from
purposes, including identifying suspects in criminal early rule-based algorithms to machine learning algorithms.
investigations, monitoring public spaces for security Despite advancements, challenges such as the potential for
purposes, and verifying identities for access control. errors and biases in the algorithms still exist. To address
However, the use of facial recognition technology is not these challenges, researchers must consider the need for
without controversy. There are concerns about privacy more representative data and the potential impacts of this
violations, potential biases in the algorith ms used, and the technology on individual privacy and civil liberties.
lack of transparency and accountability in their use. Policy makers must also consider the ethical and legal
Furthermore, the accuracy of facial recognition technology implications of this technology in criminal investigations
can vary depending on factors such as lighting conditions, [4][5][6].
facial expressions, and the quality of the images or videos
used. Despite these challenges, facial recognition technology Yang, J., Zhang, D., & Frangi, A. F. evaluates the
remains a promising tool for criminal identification and performance of detection and recognition algorithms on a
surveillance. It aims to develop a robust face detection and common dataset or benchmark[17]. Recent studies suggest
recognition system for criminal identification using a that the accuracy and reliability of detection and algorithms
have improved significantly in recent years, but limitations
combination of deep learning and classical computer vision
techniques. The system will utilize Convolutional Neural such as racial biases and data imbalances still exist. To
Networks (CNN) for face recognition and the Haar Cascade address these limitations, researchers must continue to
Classifier for face detection. Additionally, OpenCV, a develop and improve face detection and recognition
popular computer vision library, will be used for developing technology [7][8].
the system. Alvaro M. Bedoya, & I. A. T. Alqawas mi et al., provides
an overview of the challenges and controversies surrounding
II. LITERATURE SURVEY facial recognition technology, including issues related to
Viola, P., & M. Jones, provides deep learning techniques privacy, accuracy, and bias [20]. They also provide an
for facial detection in criminal investigations. They discussed overview of the different techniques and algorithms used in
the importance of facial recognition technology in criminal face detection and recognition systems, including Haar
Cascade, CNNs, and other machine-learning approaches. database of known faces to determine potential matches
[9][10]. based on facial features. OpenFace utilizes deep learning -
based techniques to extract and analyze facial features,
Yan, S., Zhou, X., &Chellappa, R. introduce an approach
creating facial embeddings for comparison. It is known for
called deep learning for facial recognition in real-time its high accuracy in facial recognition tasks. However,
surveillance videos. The study used a large-scale dataset of
ethical considerations, privacy, and legal requirements must
criminals and achieved high accuracy in identifying be adhered to when using facial recognition technology for
individuals in real-time surveillance videos [14][15]. Face
criminal identification or any other purpose.
detection and recognition technologies have significant
potential for criminal identification and surveillance. The V. PROPOSED WORK
methodological challenges need to be addressed to ensure the
accuracy, reliability, and ethical use of these technologies. In this proposed work, we are Using CCTV cameras that
Further research is needed to implement facial detection are continuously working in a public place. In the
algorithms that can overcome the limitations of low-quality Implementation of the system, we already saved criminals’
images and biased training data and to establish ethical image data with their names on photographs in the database.
guidelines for their use in criminal identification [11]. We are processing those images and extracting features
extraction; we are taking the face encodings of the present
Zhang, D., & Jain, A. K. & Zhao, G., Mattson, M. S., images and saving them into one file using Pickle. Using
Phillips, P. J., & Rosenfeld, A. proposed a method for face open-CV while capturing the footage in CCTV and if any
recognition in low-resolution surveillance images. The match is found then automatically on screen it will display an
method uses deep learning algorithms and achieved high image of that criminal whose face matches and display the
accuracy in identifying criminals fro m low-resolution message with his name that criminal found, and his captured
images[18][19]. Ho wever, there are several methodological image will be saved into special folder police will go and
issues and limitations associated with face detection. One catch him fro m that public place even if he once captured in
such issue is the quality and resolution of surveillance the CCTV footage. As we saved the person's image in the
videos, which can affect the accuracy of facial recognition special fo lder fro m there police will co me to know whose
algorithms. Another issue is the potential for bias and errors image was matched with captured one.
in the training data used to develop facial recognition models
[12][13].
Apply the face detection classifier: Apply the face [12] Zhang, D., & Jain, A. K. (2020). Automatic criminal identification
detection classifier to the pre-processed image using the using soft biometrics. IEEE Transactions on Information Forensics
and Security, 5(4), 762-772.
"detect Multi-Scale" function in OpenCV. This function
[13] Zhao, G., Mattson, M. S., Phillips, P. J., & Rosenfeld, A. (2017). Face
detects all the faces in the image and returns their bounding recognition: Algorithms, applications, and future directions.
boxes. Proceedings of the IEEE, 96(10), 1587-1608.
Draw bounding boxes around the detected faces: Iterate [14] Zhao, W., Chellappa, R., Phillips, P. J., & Rosenfeld, A. (2019). Face
over the detected faces and draw bounding boxes around recognition: A literature survey. ACM Computing Surveys (CSUR),
35(4), 399-458.
them on the original image using OpenCV's drawing
[15] Jacob, T. P., & Ravi, T . (2015). Optimal regression test case
functions. prioritization using genetic algorithm. Life Science Journal, 10(3),
1021-1033.
Display or save the output: Display the image with the
[16] Singh, R., & Gupta, P. (2019). A review of face detection and
detected faces and their bounding boxes, or save the output recognition techniques. International Journal of Computer
to a file. Applications, 161(6), 1-7.
[17] YuliaGizatdinova and VeikkoSurakka, “Feature-Based Detection
VIII. CONCLUSION Official Landmarks from Neutral and Expressive Facial Images”,
Face detection and recognition systems based on IEEE T RANSACTIONS ON PATTERN ANALYSIS AND
MACHINE INTELLIGENCE, VOL. 28, NO. 1, JANUARY 2006
convolutional neural networks have shown great promise in
[18] Sanika Tanmay Ratnaparkhi, AamaniT andasi, Shipra Saraswat, “Face
improving the accuracy and efficiency of criminal Detection and Recognition for Criminal Identification System”,2021
identification and detection. These systems rely on pre - 11th International Conference on Cloud Computing, Data Science
processing techniques to enhance images, convolutional & Engineering (Confluence) 2021
layers to extract features, pooling layers to reduce [19] Alireza Chevelwalla, Ajay Gurav, Sachin Desai, Prof.
dimensionality, and fully connected layers to classify faces. SumitraSadhukhan, “Criminal Face Recognition System”,
InternationalJournal of Engineering Research & Technology
The optimization process involves adjusting the parameters (IJERT ) 2015
and hyperparameters of the CNN to improve its [20] Vikram Mohanty, David Thames, Sneha Mehta, and Kurt Luther,
performance, including techniques such as learning rate “Photo Sleuth: Combining Human Expertise and FaceRecognition to
adjustment, regularization, dropout, batch normalization, Identify HistoricallyPortraits”, Conference: the 24th International
Conference, March 2019.
data augmentation, and transfer learning. While these
systems have shown promising results, there are still
challenges to overcome such as issues with bias, privacy
concerns, and potential misuse. However, with further
research and development, face recognition systems can be
an important tool in imp roving criminal identification and
detection, enhancing public safety, and aiding law
enforcement agencies.
REFERENCES
[1] Viola, P., & Jones, M. (2018). Robust real-time face detection.
International journal of computer vision, 57(2), 137-154.
[2] Jacob, T. P., Pravin, A., & Asha, P. (2018). Arduino object follower
with augmented reality. Int. J. Eng. Technol, 7(3.27), 108-110.
[3] T urk, M., & Pentland, A. (2014). Face recognition using eigenfaces.
Proceedings of the IEEE Conference on Computer Vision and Pattern
Recognition, 586-591
[4] Pravin, A., Prem Jacob, T., & Nagarajan, G. (2019). Robust technique
for data security in multi-cloud storage using dynamic slicing with
hybrid cryptographic technique. Journal of Ambient Intelligence and
Humanized Computing, 1-8.
[5] Jacob, T. P., & Ravi, T. A. (2019). A novel approach for test suite
prioritization. Journal of Computer Science, 10(1), 138.
[6] Ahonen, T ., Hadid, A., &Pietikainen, M. (2010). Face recognition
with local binary patterns. Proceedings of the European Conference
on Computer Vision, 469-481.
[7] Jacob, T. P., & Ravi, T. (2018). An optimal technique for reducing
the effort of regression tests. Indian J. Sci. T echnol, 6(8), 5065-5069.
[8] Yang, J., Zhang, D., &Frangi, A. F. (2020). T wo-stage face detection
based on support vector machines. IEEE Transactions on Circuits and
Systems for Video T echnology, 21(6), 758-766.
[9] Varun, K. S., Puneeth, I., & Jacob, T. P. (2019, April). Virtual mouse
implementation using open CV. In 2019 3rd International Conference
on Trends in Electronics and Informatics (ICOEI) (pp. 435-438).
IEEE.
[10] Alvaro M. Bedoya. & I. A. T. Alqawasmi et al., (2017). Probabilistic
visual learning for object detection. Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, 786-793.
[11] Yan, S., Zhou, X., &Chellappa, R. (2019). A fast and accurate face
detection scheme for real-world applications. Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, 1-8.