Face Recognition for Law Enforcement Agencies

DOI : 10.17577/IJERTV12IS050014

Download Full-Text PDF Cite this Publication

Text Only Version

Face Recognition for Law Enforcement Agencies

1st Avi Sharma

Department of Computer EngineeringRamrao Adik Institute of Technology

Navi Mumbai, India

2nd Ashutosh Sarangale Department of Computer EngineeringRamrao Adik Institute of Technology Navi Mumbai, India

3rd Neha Vedak

Department of Computer EngineeringRamrao Adik Institute of Technology

Navi Mumbai, India

4th Kailash Rampariya Department of Computer Engineering Ramrao Adik Institute of Technology

Navi Mumbai, India

5th Amarsinh Vidhate Department of Computer Engineering Ramrao Adik Institute of Technology

Navi Mumbai, India

AbstractThe goal of this research article is to discuss the creation of a crime prevention system that uses facial recognitiontechnology to detect suspects. The system will be built with JavaScripts Face API and will function in real- time. Using machine learning approaches, the system will be trained to recognize faces and compare them to a database of known suspects. The scalability and flexibility of the system to various law enforcement settings will be evaluated by evaluating its accuracy, speed, and usability with a database of known suspects and real-time video feeds. Privacy issues will be addressed in the systems design, and safeguards will be put in place to protect the privacy of innocent people. In addition, the system will adhereto current rules and guidelines for the use of facial recognition technology in law enforcement. The ultimate purpose of this research is to contribute to the creation of reliable and effective crime prevention systems that use face recognition technology, therefore assisting in crime prevention and the progress of facial recognition technology in law enforcement.

Index TermsCrime, Prevention, Face, recognition, Detection,Safety

  1. INTRODUCTION

    Criminal behavior is ubiquitous in practically every civilization today. Criminals employ modern technology to perpetrate crimes, making it more difficult for law enforcement to identify and capture suspects. The Republic of India is no exception, with the police department serving as the primary organization in charge of crime prevention. However, the criminal area units and criminal investigation systems present paper-based technique makes it difficult to identify offenders and conduct investigations effectively.

    While CCTV cameras are frequently utilized by the public to monitor their surroundings, the data is typically notcentralized, making it difficult for law enforcement to follow offenders. The initial purpose of this research is to automate the police departments present manual system. This not only cuts down on the time it takes to match criminal records, identify suspects, and search criminal records, but it also cuts down on paperwork. The planned system is designed to reduce the need for human data entry, resulting in a greater

    level of service and efficiency. It is intended to be user- friendly and engaging in order to provide optimal security while eliminating manual labour. The research tries to solve these challenges and, to some extent, alleviate employment and psychological conflict. As a result, the focus of this research is on the creation of a crime prevention system that employs facial recognition technology to detect suspects. The technology will employ JavaScripts Face API and will function in real- time, allowing law enforcement authorities to rapidly and effectively identify suspects. The scalability and flexibility of the technology will be evaluated using a databaseof known suspects and real-time video feeds. To guarantee that the privacy of innocent persons is not compromised, privacy problems will be handled in the systems architecture. The studys goal is to contribute to the creation of reliable and effective crime prevention systems that use face recognition technology, therefore assisting in crime prevention and the progress of facial recognition technology in law enforcement.

  2. LITERATURE SURVEY

    1. Survey of Existing System

      This literature review focuses on using facial recognition technologies in law enforcement and associated research. Jain et al. (2016) assessed existing facial recognition technologies and discovered considerable gains in accuracy over the previous decade. They did, however, emphasize the need of building algorithms that can deal with differences in illumination, posture, and facial expression.[4][9]

      Another research, this time by the National Institute of Standards and Technology (NIST), evaluated the effectivenessof face recognition algorithms in real-world scenarios. They discovered that accuracy varied depending on image quality, posture, and lighting conditions. Liao et al. (2020) performed a poll and discovered that while the public generally supports the use of facial recognition technology in law enforcement, they are concerned about privacy and the possibility of misuse. [3][7]

      Several additional studies have looked into the usage of facial recognition technology in law enforcement, as well as the possibility of prejudice and inaccuracy. These studies emphasize the importance of exercising caution and carefully considering ethical and legal considerations when employing such technology in law enforcement.

      Overall, the research demonstrates that, while facial recognition technology has the potential to help law enforcement identify suspects, it is critical to address issues about accuracy, prejudice, and privacy before using such technologieson a larger scale.

    2. Limitations of Existing System

      • Accuracy: Many factors, including image quality, posture,and lighting conditions, might impact the accuracy offacial recognition algorithms. This can lead to false positives and false negatives in law enforcement, which can have catastrophic repercussions.[5]

      • Bias: It has been discovered that facial recognition al- algorithms are prejudiced towards specific demographicgroups, such as individuals of color and women. Asa result, excessive targeting and erroneous arrests may occur.

      • Individual Privacy Concerns: Face recognition allows mass identification by governments. While not correctlimits, some worry about the abuse of privacy rights. But what concerning is if its a non- public company that uses the technology, they might track you, recognize that stores you visit; theyll even market specific merchandise to you. Businesses that attempt to use face recognition ought to address these issues in a purposeful, organized manner.

      • Data Privacy Concern: With information breaches, face recognition info may fall under the incorrect hands. though systems are becoming higher at preventing fraud, it may still happen. Besides, corporations may use the information you provide them for analysis functions. Asa result, they stand to achieve a benefit from it, while not your consent. Also, corporations may share or maybe sell this information to 3rd parties, permitting them, in turn, to acknowledge and track you.[9]

  3. PROPOSED METHODOLOGY

    As illustrated, the first stage is to create face databases that will act as the systems match template. A face database isdeveloped by collecting many photographs of people. In a half-body picture, the subjects face should be facing front for the snapshot. When the identification of a picture is validated, the digitally acquired image is processed. The following step will begin when the picture has been detected and retrieved. The following stage, known as pre-processing, comprises removing any extraneous characterstics. The idea is to drastically minimize processing time. The program first extracts the vector representations of the images from the database, then computesthe average face vector or mean, and then subtracts the mean face from each sample face. The application

    determines the technique for getting facial pictures. Surveillance applications,for example, may benefit from capturing face images using a video camera, but image database research may necessitate static intensity shots recorded with a standard camera. Access to high-security domains, for example, may require the user tostand in front of a 3D scanner or an infrared sensor, eliminatingthe non-intrusive element of face recognition.[5][8]

    Fig. 1. Flowchart

    Faceapi is a JavaScript library that enables real-time facial identification, recognition, and monitoring. It functions by analyzing raw images or video frames and applying deep learning algorithms to recognize faces, facial traits, and additional characteristics like gender, age, and expression.[1][2]

    Based on machine learning models that have already been taught using a sizable collection of facial pictures, the library was created. These models categorize incoming pictures based on facial characteristics and extract features from the images using convolutional neural networks (CNNs).[4]

  4. IMPLEMENTATION AND RESULTS

  1. Implementation Details

    Welcome to our Crime Detection website, your one- stop shop for solving crimes and providing justice to victims. Our goal is to provide cutting-edge technology and resources to lawenforcement and detectives to help them solve crimes more swiftly and efficiently.

    Our Crime Detection website provides a wide range of innovative capabilities to assist law enforcement organizations

    Fig. 2. Home Page

    Fig. 3. Main Features

    and detectives in solving crimes more quickly and efficiently. Here are some of the important features youll discover on our website: Our face recognition technology can assist identify suspects and compare them to other photographs in our database.

    Forensic analysis tools: Our forensic analysis tools can assist investigators in analyzing evidence and reconstructing crime scenes.

    Advanced surveillance systems: Our sophisticated surveillance systems can assist monitor criminal activities and tracing suspects in real-time.

    Data analysis tools: Our data analysis tools can assist investigators in identifying patterns and trends in criminal activity, making it simpler to solve crimes and avoid future ones.

    Were always creating and enhancing our technologies at our Crime Detection website in order to keep one step ahead of crooks. Our mission is to deliver the most advanced crime detection systems available, therefore making the world a saferplace for everyone.

  2. Result Analysis

Fig. 4. Registering Suspect

Step 1: After Clicking on the Demo Button on the first pagewe will be redirected to a new page where we are having 2 options: 1. Register the suspect 2. Catch the suspect. We will start by registering the suspect.

Fig. 5. Suspect Details Entry

Step 2: After Clicking on register the suspect, we will have the option to choose many photos of the suspect which will help the model to train and detect easily.

Fig. 6. Choosing Photos

Step 3: Hence after choosing the good amount of imageswe will click on Submit Button.

Fig. 7. Type of Video Stream

Step 4: After registering the suspect, we will click on the Catch the Suspect button, and then a new menu will be opened. The menu will be asking the user to input a Video or to run a live stream to detect/ catch the criminal.

Fig. 8. Final Output

Step 5: At last the model is trained and the criminal is detected named: Avi Sharma

Fig. 9. Pie Chart for Accuracy

The accuracy of a facial recognition model created for law enforcement agencies is evaluated in this study. The model wasevaluated with 136 test cases using various lighting conditionsand cameras, yielding an accuracy rate of 88.5 percent. While the bulk of the faces were accurately recognized, 11.5 percent of the live broadcast faces were wrongly detected. According to the findings of this study, the face recognition model built for Law Enforcement Agencies is effective at detecting faces with a high degree of accuracy. However, there is still potential for improvement when it comes to successfully detecting all live broadcast faces.

The ramifications of this work are significant for law enforcement agencies, as precise and reliable facial recognitiontechnology is critical in suspect identification and apprehending. The findings of this study can be used to guide the development and enhancement of facial recognition modelsfor use in law enforcement agencies in the future. Overall,this study adds to the expanding corpus of research on facial recognition technology by highlighting the possible benefits and drawbacks of its application in law enforcement. More research in this field can improve the efficacy and dependability of facial recognition technology, benefiting law enforcement organizations and the communities they serve.

CONCLUSION AND FUTURE WORK

Finally, the Crime Preventer system, which uses JavaScriptsFace API to detect suspects faces, is a feasible choice for crime prevention and investigation. Deep learning and computer vision methods are used by the technology to recognize and recognize faces.

In real-time, boosting the effectiveness and efficiency of law enforcement forces. Future studies might focus on improving the systems accuracy and robustness, particularly when coping with tough situations including bad lighting, occlusions, and position fluctuations. Furthermore, the system might be modified to incorporate capabilities like automatic suspect identification and integration with other crime-prevention technology like CCTV cameras and alarms.

REFERENCES

[1] Face API documentation. (n.d.). Microsoft Azure. Retrieved from https://docs.microsoft.com/en-us/azure/cognitive-services/face/

[2] Jain, A. K., Ross, A., Nandakumar, K. (2016). Introduction to biometrics. Springer.

[3] Zhao, W., Chellappa, R., Phillips, P. J., Rosenfeld, A. (2003). Face recognition: A literature survey. ACM Computing Surveys, 35(4), 399- 458.

[4] Taigman, Y., Yang, M., Ranzato, M. A., Wolf, L. (2014). DeepFace: Closing the gap to human-level performance in face verification. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 1701-1708).

[5] Schroff, F., Kalenichenko, D., Philbin, J. (2015). FaceNet: A unified embedding for face recognition and clustering. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 815- 823).

[6] Deng, J., Dong, W., Socher, R., Li, L. J., Li, K., Fei-Fei, L. (2009).

Imagenet: A large-scale hierarchical image database. In 2009 IEEE conference on computer vision and pattern recognition (pp. 248- 255).

[7] Sa´nchez, J., Perronnin, F., Mensink, T., Verbeek, J. (2013). Image classification with the fisher vector: Theory and practice. International Journal of Computer Vision, 105(3), 222-245.

[8] Li, Z., Li, J., Li, C., Li, X., Liu, J. (2021). Real-time face recognition based on deep learning for edge computing devices. Journal of Ambient Intelligence and Humanized Computing, 12(6), 5753- 5763.

[9] Sankaranarayanan, S., Balaji, Y., Jain, A., Chellappa, R. (2018). Triplet probabilistic embedding for face verification and clustering. In Proceedings of the European Conference on computer vision (ECCV) (pp. 84-100).

[10] Turk, M., Pentland, A. (1991). Face recognition using eigenfaces. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. 586-591).

[11] Viola, P., Jones, M. (2001). Rapid object detection using a boosted cascade of simple features. In Proceedings of the IEEE conference on computer vision and pattern recognition (pp. I-511-I-51).

[12] Li, C., Li, Z., Li, J. (2021). Real-time face recognition for surveillance systems based on edge computing. Journal of Ambient Intelligence and Humanized Computing, 12(8), 9399-9410.