A Deep Learning-Based Approach for Identification and Recognition of Criminals
Keywords:
Forensic Face sketch, Deep Learning, ANN, Criminals, AttackAbstract
Face sketch recognition is one of the most researched issues in forensic science. Automatically retrieving suspect mug-shot images, police record can facilitate them swiftly tapered down and eliminate prospective suspects, but in most circumstances, a suspect's photographic image is not available. Sketching from the memories of an eyewitness or a victim is frequently the best substitute. In general, this procedure is slow and ineffective, as it does not allow for the identification and arrest of the appropriate culprit. As a result, a more powerful algorithm for even partial face sketch recognition is frequently beneficial. Many solutions have been offered in this scenario, particularly the techniques used in face recognition systems, which are regarded among the best and most effective. Our project uses deep learning and cloud infrastructure to allow users to create composite face sketches of suspects without the assistance of forensic artists using the application's drag and drop feature, and to automatically match the drawn composite face sketch with the police database much faster and more efficiently.
Downloads
References
A. F. Guneri and A. T. Gumus, “The usage of artificial neural networks for finite capacity planning,” Int. J. Ind. Eng. Theory Appl. Pract., vol. 15, no. 1, pp. 16–25, 2008.
N. Paji, M. Djapan, E. Buluschek, W. Fahrenbruch, and Đ. Aleksandar, “MACHINE LEARNING PREDICTION MODEL FOR SMALL DATA SETS INSTEAD OF DESTRUCTIVE TESTS FOR A CASE OF RESISTANCE BRAZING PROCESS VERIFICATION,” vol. 30, no. 3, pp. 797–814, 2023, doi: 10.23055/ijietap.2023.30.3.8691.
B. Yin, “SPACE-TIME GRAPH-BASED CONVOLUTIONAL NEURAL NETWORKS OF,” vol. 30, no. 2, pp. 451–462, 2023, doi: 10.23055/ijietap.2023.30.2.8581.
S. Supreeth and K. Patil, “VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment,” KSII Trans. Internet Inf. Syst., vol. 16, no. 6, pp. 1892–1912, 2022, doi: 10.3837/tiis.2022.06.007.
S. Supreeth and K. K. Patil, “Virtual machine scheduling strategies in cloud computing- A review,” Int. J. Emerg. Technol., vol. 10, no. 3, pp. 181–188, 2019.
C. Galea and R. A. Farrugia, “Forensic Face Photo-Sketch Recognition Using a Deep Learning-Based Architecture,” IEEE Signal Process. Lett., vol. 24, no. 11, pp. 1586–1590, Nov. 2017, doi: 10.1109/LSP.2017.2749266.
B. Xiao, X. Gao, D. Tao, and X. Li, “A new approach for face recognition by sketches in photos,” Signal Processing, vol. 89, no. 8. Elsevier BV, pp. 1576–1588, Aug. 2009. doi: 10.1016/j.sigpro.2009.02.008.
C. Frowd, A. Petkovic, K. Nawaz and Y. Bashir, "Automating the Processes Involved in Facial Composite Production and Identification," 2009 Symposium on Bio-inspired Learning and Intelligent Systems for Security, Edinburgh, UK, 2009, pp. 35-42, doi: 10.1109/BLISS.2009.15.
S. Akbari Farjad and K. Faez, “Matching Forensic Sketches to Mug Shot Photos Using a Population of Sketches Generated by Combining Geometrical Facial Changes and Genetic Algorithms,” Orient. J. Comput. Sci. Technol., vol. 11, no. 2, pp. 78–87, Jun. 2018, doi: 10.13005/OJCST11.02.03.
S. Patil and D. D. C, “Composite Sketch Based Face Recognition Using ANN Classification,” Int. J. Sci. Technol. Res., vol. 9, p. 1, 2020, Accessed: Jun. 17, 2023. [Online]. Available: www.ijstr.org
Vineet Srivastava, "Forensic Face Sketch Recognition Using Computer Vision", International Journal on Recent and Innovation Trends in Computing and Communication, 1(4), 351–354. https://doi.org/10.17762/ijritcc.v1i4.2789
S. Dalal, V. P. Vishwakarma, and S. Kumar, “Feature-based Sketch-Photo Matching for Face Recognition,” Procedia Comput. Sci., vol. 167, pp. 562–570, Jan. 2020, doi: 10.1016/J.PROCS.2020.03.318.
A. Abhijit Patil, A. Sahu, J. Sah, S. Sarvade, and S. Vadekar, “Forensic Face Sketch Construction and Recognition,” Int. J. Inf. Technol., vol. 6, Accessed: Jun. 17, 2023. [Online]. Available: www.ijitjournal.org
M. Gupta, B. Bhagria, and P. Gujar, “Face Sketch Recognition,” Int. J. Trend Res. Dev., vol. 8, no. 2, pp. 2394–9333, doi: 10.1109/LSP.2017.2749266.
M. Zhu, N. Wang, X. Gao, and J. Li, “Deep Graphical Feature Learning for Face Sketch Synthesis,” 2017.
S. Manna, S. Ghildiyal, and K. Bhimani, “Face Recognition from Video using Deep Learning,” pp. 1101–1106, Jul. 2020, doi: 10.1109/ICCES48766.2020.9137927.
P. J. Thilaga, B. A. Khan, A. A. Jones, and N. K. Kumar, “Modern Face Recognition with Deep Learning,” Proc. Int. Conf. Inven. Commun. Comput. Technol. ICICCT 2018, pp. 1947–1951, Sep. 2018, doi: 10.1109/ICICCT.2018.8473066.
H. Kiani Galoogahi and T. Sim, “Face sketch recognition by Local Radon Binary Pattern: LRBP,” Proc. - Int. Conf. Image Process. ICIP, pp. 1837–1840, 2012, doi: 10.1109/ICIP.2012.6467240.
L. Nie, L. Liu, Z. Wu, and W. Kang, “Unconstrained face sketch synthesis via perception-adaptive network and a new benchmark,” Neurocomputing, vol. 494, pp. 192–202, Jul. 2022, doi: 10.1016/J.NEUCOM.2022.04.077.
W. Zhang, X. Wang, and X. Tang, “Coupled information-theoretic encoding for face photo-sketch recognition,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., pp. 513–520, 2011, doi: 10.1109/CVPR.2011.5995324.
W. Wan and H. J. Lee, “Deep feature representation for face sketch recognition,” Adv. Sci. Technol. Eng. Syst., vol. 4, no. 2, pp. 107–111, 2019, doi: 10.25046/AJ040214.
A. Krizhevsky, I. Sutskever, and G. E. Hinton, “ImageNet Classification with Deep Convolutional Neural Networks,” Adv. Neural Inf. Process. Syst., vol. 25, 2012, Accessed: Jun. 21, 2023. [Online]. Available: http://code.google.com/p/cuda-convnet/
K. Bonnen, B. F. Klare, and A. K. Jain, “Component-based representation in automated face recognition,” IEEE Trans. Inf. Forensics Secur., vol. 8, no. 1, pp. 239–253, 2013, doi: 10.1109/TIFS.2012.2226580.
P. C. Yuen and C. H. Man, “Human face image searching system using sketches,” IEEE Trans. Syst. Man, Cybern. Part ASystems Humans, vol. 37, no. 4, pp. 493–504, Jul. 2007, doi: 10.1109/TSMCA.2007.897588.
M. A. A. Silva and G. Camara-Chavez, “Face sketch recognition from local features,” Brazilian Symp. Comput. Graph. Image Process., pp. 57–64, Oct. 2014, doi: 10.1109/SIBGRAPI.2014.24.
S. G., M. R. Mundada, S. Supreeth, and B. Gardiner, “Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing,” International Journal of Computer Network and Information Security, vol. 15, no. 4. MECS Publisher, pp. 84–95, Aug. 08, 2023. doi: 10.5815/ijcnis.2023.04.08.
G. Shruthi, M. R. Mundada, B. J. Sowmya, and S. Supreeth, “Mayfly Taylor Optimisation-Based Scheduling Algorithm with Deep Reinforcement Learning for Dynamic Scheduling in Fog-Cloud Computing,” Applied Computational Intelligence and Soft Computing, vol. 2022. Hindawi Limited, pp. 1–17, Aug. 28, 2022. doi: 10.1155/2022/2131699.
G. Dhingra et al., “Traffic Management using Convolution Neural Network,” International Journal of Engineering and Advanced Technology, vol. 8, no. 5s. Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP, pp. 146–149, Jun. 29, 2019. doi: 10.35940/ijeat.e1031.0585s19.
Pundalik Chavan, Neelam Malyadri, Husna Tabassum, Supreeth S, Bhaskar Reddy PV, Gururaj Murtugudde, Rohith S, Manjunath SR, Ramaprasad H C, “Dual Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network,” Cybernetics and Information Technologies, vol. 23, no. 3. Walter de Gruyter GmbH, pp. 3–19, Sep. 01, 2023.
S. Supreeth, K. Patil, S. D. Patil, S. Rohith, Y. Vishwanath, and K. S. V. Prasad, “An Efficient Policy-Based Scheduling and Allocation of Virtual Machines in Cloud Computing Environment,” Journal of Electrical and Computer Engineering, vol. 2022. Hindawi Limited, pp. 1–12, Sep. 24, 2022. doi: 10.1155/2022/5889948.
S. Supreeth, K. Patil, S. D. Patil, and S. Rohith, “Comparative approach for VM Scheduling using Modified Particle Swarm Optimization and Genetic Algorithm in Cloud Computing,” 2022 IEEE International Conference on Data Science and Information System (ICDSIS). IEEE, Jul. 29, 2022. doi: 10.1109/icdsis55133.2022.9915907.
S. G., M. R. Mundada, and S. S., “Resource Allocation Using Weighted Greedy Knapsack Based Algorithm in an Educational Fog Computing Environment,” International Journal of Emerging Technologies in Learning (iJET), vol. 17, no. 18. International Association of Online Engineering (IAOE), pp. 261–274, Sep. 21, 2022. doi: 10.3991/ijet.v17i18.32363.
S. Kumara, N. H. Prasad, M. Monika, H. Tuli, S. Supreeth, and S. Rohith, “Smart Vehicle Parking System on Fog Computing for Effective Resource Management,” 2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC). IEEE, Jun. 16, 2023. doi: 10.1109/icaisc58445.2023.10201108.
Vinston Raja, R., Ashok Kumar, K. ., & Gokula Krishnan, V. . (2023). Condition based Ensemble Deep Learning and Machine Learning Classification Technique for Integrated Potential Fishing Zone Future Forecasting. International Journal on Recent and Innovation Trends in Computing and Communication, 11(2), 75–85. https://doi.org/10.17762/ijritcc.v11i2.6131
Anna, G., Jansen, M., Anna, J., Wagner, A., & Fischer, A. Machine Learning Applications for Quality Assurance in Engineering Education. Kuwait Journal of Machine Learning, 1(1). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/109
Kumar, S. A. S., Naveen, R., Dhabliya, D., Shankar, B. M., & Rajesh, B. N. (2020). Electronic currency note sterilizer machine. Materials Today: Proceedings, 37(Part 2), 1442-1444. doi:10.1016/j.matpr.2020.07.064
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.