Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces

IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS
Rishi Gupta, Amit Kumar Gupta, Deepak Panwar, Ashish Jain, Partha Chakraborty
{"title":"Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces","authors":"Rishi Gupta, Amit Kumar Gupta, Deepak Panwar, Ashish Jain, Partha Chakraborty","doi":"10.1155/2023/4284045","DOIUrl":null,"url":null,"abstract":"The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. The use of facial recognition might range from that of an entertainment tool to one of a security tool. Even while other forms of biometric identification, such as fingerprints and iris scans, are reliable, they require the active participation of an individual. As a result, criminals cannot rely on them as the most reliable means of verification. When a criminal database, which stores the individual details of a criminal, and facial recognition technology are brought together, it can identify a criminal who is depicted in an image or seen in a video feed. Not only does a criminal recognition system needs to have a high level of accuracy, but it also needs to be able to adapt to significant changes in lighting, occlusion, aging, expressions, and other factors. In this study, they were analyzed and compared with the many methods of face detection and face recognition, such as HAAR cascades, local binary patterns histogram, support vector machines, convolutional neural networks, and ResNet-34. These methods include a variety of different approaches to recognizing faces. An analysis of these strategies is also conducted and then put into practice to those that seem to be the most effective for the designed criminal recognition system. In addition to that, a variety of uses of this criminal recognition in the real world are also discussed.","PeriodicalId":46573,"journal":{"name":"Journal of Electrical and Computer Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":1.2000,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Electrical and Computer Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2023/4284045","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. The use of facial recognition might range from that of an entertainment tool to one of a security tool. Even while other forms of biometric identification, such as fingerprints and iris scans, are reliable, they require the active participation of an individual. As a result, criminals cannot rely on them as the most reliable means of verification. When a criminal database, which stores the individual details of a criminal, and facial recognition technology are brought together, it can identify a criminal who is depicted in an image or seen in a video feed. Not only does a criminal recognition system needs to have a high level of accuracy, but it also needs to be able to adapt to significant changes in lighting, occlusion, aging, expressions, and other factors. In this study, they were analyzed and compared with the many methods of face detection and face recognition, such as HAAR cascades, local binary patterns histogram, support vector machines, convolutional neural networks, and ResNet-34. These methods include a variety of different approaches to recognizing faces. An analysis of these strategies is also conducted and then put into practice to those that seem to be the most effective for the designed criminal recognition system. In addition to that, a variety of uses of this criminal recognition in the real world are also discussed.
罪犯面孔检测与识别专家系统的设计与分析
利用面部特征来识别一个人的过程被称为面部识别,这是生物识别的一种形式。面部识别的使用范围从娱乐工具到安全工具。尽管指纹和虹膜扫描等其他形式的生物识别技术是可靠的,但它们需要个人的积极参与。因此,犯罪分子无法将其作为最可靠的核查手段。当存储罪犯个人细节的犯罪数据库和面部识别技术结合在一起时,它可以识别图像中描述的罪犯或在视频中看到的罪犯。犯罪识别系统不仅需要具有高水平的准确性,而且还需要能够适应光照、遮挡、年龄、表情和其他因素的显著变化。在本研究中,他们与HAAR级联、局部二值模式直方图、支持向量机、卷积神经网络和ResNet-34等多种人脸检测和识别方法进行了分析和比较。这些方法包括各种不同的人脸识别方法。本文还对这些策略进行了分析,并将其付诸实践,以选择对所设计的犯罪识别系统最有效的策略。除此之外,还讨论了这种犯罪识别在现实世界中的各种用途。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Electrical and Computer Engineering
Journal of Electrical and Computer Engineering COMPUTER SCIENCE, INFORMATION SYSTEMS-
CiteScore
4.20
自引率
0.00%
发文量
152
审稿时长
19 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信