In today’s virtually and technologically evolving world, technology is being used for ease of human efforts and for faster results. Appropriate security upgrade and enhancements are required to be balanced so that the users can rely and trust their personal information on these technologies. Simultaneously, persons who goes missing if found also, there’s no way to identify if it’s the actual person or not. Also, many people don’t try to help in these matters concerning about their life safety from goons and mafias because many missing cases occurs from kidnapping and abduction etc. So, in this paper we are proposing and fabricating a project that will help to resolve such type of incidences. The project must require the public support but will ensure the public safety by keeping the identity constraints safe and sound. This project is going to rotate the tedious and complex phases of finding the missing person by mere man-force. This technology is going to help the Police Force, the Cyber Cell Authorities as well the parents/relative/guardian of the missing victim. The User Interface will be easy to use and adaptive, the features and functionality will be top-notch as it will be designed in PyQt5 GUI. The main process is of matching the lost-found victims photograph by using the K-NN Algorithm (AI & ML concepts). All the gathered data will be kept safe in the PostgreSQL’s Database for future use. The algorithm will convey through calculation of data from pictures that if the person is actually matching or not. In this way the fabricated project will execute. For further details and data, a web portal will be made for the local public about the latest and recent updates about the cases.
Introduction
I. INTRODUCTION
In India every hour 48 women and 28 men approximately goes missing, which includes vast number of children also. But there are traditional existing systems that recognizes the person from their various other features i.e., birth marks, bruise / accidental marks, iris scanning etc. But rather these data have to be fed into the system prior the main processing, so as to get exact and accurate output result of the person. Also, one verifier/witness is required on spot for the verification of the person (lost/found). Besides I am going to introduce a new system in which the person can be found and verified virtually with virtual as well as physical participation. In the upcoming section, this paper will discuss about the related works.
II. LITERATURE SURVEY
A crowning ensemble-based technique for the recognition of the faces is described. In the ensemble learning a handful of methods are utilized and their outcomes are then integrated to obtain the final result of the system. In this novel system gaining the accuracy is the most important thing and the most advantageous thing. In this proposed paper [1], two most vastly used techniques are (i) K-NN for the classification and (ii) Bagging as the wrapping technique, both these techniques report to ORL database for their settings [2].
Various Real-Time Face Detection and Recognition techniques that has marked the facial biometrics [3], facial recognition is like observing the face and capturing the image later, also this study developed the algorithms using complex background techniques like- Ada Boost, Haar/Cascade feature, Local Binary Patent (LBP), PCA algorithm and facial pre-processing also performed. But all these are proved to be very efficient and resilient [4].
Docker has also proved to be a robust and efficient platform for quickly delivering the software. Docker is open source that deploys the utilization of the containers [5]. Docker has three parts (i)Docker Server (ii) Docker Client (iii) Docker Registry. The algorithm develops using various techniques like Deep Learning which is a sub-part of artificial intelligence. Deep Learning extracts the faces from the images [6], then the images is converted to gradient and then the Support Vector Machine classifiers will make these gradient back to focal point of the picture for the training set. In this way the deep learning is used for face recognition.
Face Recognition and Detection is widely used now, of which the best technological pair is of K-NN (K- Nearest Neighbour) and PCA (Principal Component Analysis) [7]. Both these techniques involve approaches for capturing and identifying the image and then comparing it with the database present. There are multiple methods in which face recognition works with the system but can also compare the selected facial features matching with the database. The sequence advances like – 1) Input Image 2) Facial Detection 3) Image Processing 4) Facial- Features Extraction 5) Verification/ Validation 6) Result [8].
III. PROPOSED WORK
In this proposed project, the model is based on the facial matching of the persons, by training the model with numerous types of faces to recognize the matching ones. My implementation in this paper is folded in some steps.
First, the data pre-processing is performed and the role of user is identified, whether its admin or public user.
Secondly, the database verifies the details of the either user, then if admin gets any formal complaint, then he/she will register the details of the missing person along with picture and circulate it via system server, same follows for the public also, found person’s picture with location coordinates to be circulated.
Gathered picture from both the sides will be collected and applied with the Principal Component Analysis and K- Nearest Neighbor Algorithms to find the accuracy percentage if the missing person is same or not.
Found and matched cases are put up on the found cases section. Whereas, the new cases can be registered and matched with the received updates from the user’s side by using the match function.
All these raw data as well as processed data gets stored in the database and the server for future documentation of the timestamps and data logs etc.
A. Block Diagram
IV. IMPLEMENTATION & ANALYSIS
A. Admin’s Module
Login Page: On every login the login page is always displayed, for the successful login; details must be entered correctly.
Admin’s Database: Entered details in the login page is verified and authorized with the database details and then only access is provided.
Admin’s Panel: After verification and granting access, finally the Admin’s Dashboard Panel.
(a) Register New Case (b) Found Cases (c) Match Case (d) Case History
B. Public’s Module
Public User’s Dashboard: After opening the system UI or the application, the dashboard panel of User’s module will be displayed always.
Public Database:The details of the User and the Lost Victims is stored in the Public Database. (e.g.-name, contact details, picture of the victim, location etc.) The details stored here can be viewed by the Admin.
C. System Architecture
The architecture of the system has some important parts which comprises the whole architecture of system. The administrative module, the User module, Database, Hosting Server, IDE etc.
My proposed system comprises of layer-based implementation also. The system utilizes three layers- (i) Front-layer (ii) Middle layer (iii) End-layer.
Front-Layer:The front layer presents the user interface for the logging in of the various users, and also provide the functions to register cases, entering the details, pictures etc., which further gets stored in the database.
Middle-Layer:The middle layer acts as the mediator between the front-layer and the end layer. Middle layer takes the data from the user, processes it and stores it in the database. Middle layer kind-of follows the protocol of client-server model.
End-Layer: The end layer is wholly responsible for storing the data in the database. In my project, I have used Python, HTML/CSS, MYSQL/POSTGRESQL, Docker etc.
V. METHODOLOGY
The system proposed by me, works on the following methodology, which is given below:
In the method applied the facial key points and values are extracted and generated from picture (face) of the lost person. The technique applied is that the library stores 68 unique facial key points for any face. These points are the floating values along with the accuracy of about 8 points after the decimal. It is shown in the figure given below.
When count of registered cases reaches to three or four, then the library generates 136 * 3 facial key points, which further defines that the 163 is the value of the x & y coordinates and they will be generated for each point, then the PCA (Principal Component Analysis) and the K-NN (K-Nearest Neighbor) classifier is trained accordingly based on these readings. Differentiated storing of facial landmark takes places by KNN classifier for different persons. In this way the facial landmarks are stored and used for matching with other person’s facial landmarks to get the result is matching or not.
After gaining some previous case data and receiving any new case later, then we just need to extract the facial landmarks of the new case victim and try to match it the previous recorded data and check the confidence level of the result. If the result declares the confidence level below 60% then the person is not same, and if the confidence level exceeds 60% then the person is same.
VI. FACTS & FIGURATIVE REPRESENTATION
The Missing Person Report of NRCB of the year 2020 states about the figurative analysis of all genders and age groups.
Conclusion
In this proposed & fabricated paper, the system turns out much efficient and all the inputs were stored exactly in the database properly (PostgreSQL Database). Also, the Missing Person Portal achieved great results in feeding information and also delivering of the form data worked out perfectly with every detail sent to the Admin’s E-mail via SMTP protocol. The working of the Public User’s Portal stored the data in the database very excellently and the result obtained were extremely great. The matching of the pictures was carried out with K-NN algorithm and stored accurately. All the details along with input and output were delivered and stored for future references. In future, the system can be upgraded with new technology to accomplish much more efficient results.
References
[1] Dr. Hossein Ebrahimpour1, Dr. Abbas Kouzani2 1 The University of Kashan, Faculty of Engineering, Kashan, Iran 2 Deakin University, Geelong, Victoria 3217, Australia, June 2021.
[2] Ni Kadek Ayu Wirdiani, Praba Hridayami, Ni Putu Ayu Widiari, Komang Diva Rismawan, Putu Bagus Candradinatha, I Putu Deva Jayantha, Vol. 6, No. 2, Nov 2019 p-ISSN 2407-7658, e-ISSN 2460-0040.
[3] Adil Shaik Uma Vidyadhari Chetlur, Master of Science in Telecommunication Systems May 2020.
[4] Prachi Sasankar and Usha Kosarkar, A Study for Face Recognition Using Techniques PCA and KNN, EasyChair Preprint No - 4931.
[5] Shefali Patil 1, Pratiksha Gaikar 1, Divya Kare 1, Sanjay Pawar, International Journal Of Progressive Research In Science And Engineering, VOL.2, NO.6, JUNE 2021.
[6] Neha Gholape, Ashish Gour, Shivam Mourya, e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering-Technology & Science Volume:03/Issue:04/April-2021 Impact Factor- 5.354.
[7] Sanskar Pawar1 , Lalit Bhadane2 , Amanullah Shaikh3 , Atharv Kumbhejkar4 , Swati Jakkan5, International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 08 Issue: 12 | Dec 2021 www.irjet.net p-ISSN: 2395-0072.
[8] Bharath Darshan Balar, D S Kavya, Chandana M, Anush E, Vishwanath R Hulipalled, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-8, Issue-5S, May 2019.