scholarly journals SOME PROBLEMS OF USING THE FACIAL RECOGNITION SYSTEM IN LAW ENFORCEMENT ACTIVITIES

2021 ◽  
Vol 17 (1(63)) ◽  
pp. 189-200
Author(s):  
Василий Васильевич ЯРОВЕНКО ◽  
Галина Михайловна ШАПОВАЛОВА ◽  
Ринат Альбертович ИСМАГИЛОВ

The article draws attention to the problems of the use of modern software and hardware tools and methods of facial fixing and recognizing by law enforcement agencies. In using various techniques aimed at obtaining information on a person’s physiological and biological characteristics, it is important to respect not only his or her right to protect the data, but also state interests in combating crime (terrorism, corruption). Important factors are state regulation and the development of norms for the effective use of information technologies, telecommunications and artificial intelligence technologies so that citizens do not doubt their effectiveness and legitimacy. Purpose: to analyze current problems of combating crime; to submit proposals for improving the application of the facial recognition system, and the establishment by the Ministry of Internal Affairs of a single biometric database of Russians with the strictest compliance with citizens' constitutional rights to privacy, reliable protection of their personal data. Methods: the authors use empirical methods of comparison, description, interpretation as well as theoretical methods of formal and dialectical logic. Results: the study reveals the problems of using the facial recognition system, the advantages and disadvantages of the system are analyzed. On the one hand, in the Russian Federation there are no clear instructions and an algorithm for the use of face-recognition cameras, which would satisfy society’s requirements to protect private life and personal and family privacy. On the other hand, face-recognition cameras can assist law enforcement authorities in locating wanted persons and detecting (solving) crimes.

2021 ◽  
Vol 2089 (1) ◽  
pp. 012078
Author(s):  
Syed Mansoora ◽  
Giribabu Sadineni ◽  
Shaik Heena Kauser

Abstract When it comes to classroom management, the attendance check is a critical component. Time-consuming, particularly when it comes to open meetings, is checking attendance by calling names or by handing around a sign-in sheet to make it easier to commit fraud. An implementation of a real-time attendance check is described in this article in great detail facial recognition system and its outcomes. The system must be able to identify a student’s face in order for it to work first snap a photograph of the pupil and save it in a database as a reference for future use. During the event, there were students may be identified by using the webcam, which captures photos of their faces auto-detects faces and selects students with names that are most likely to match, and lastly, depending on the facial recognition findings, an excel file will be updated to reflect attendance. To identify faces in webcam footage, the system uses a pre-trained Haar Cascade model. As a result, a 128-bit FaceNet has been generated by training it to minimise the triplet loss. The dimensions of the facial picture. When two facial pictures have similar encodings If the two facial pictures are from the same student or different. Use of the system as part of a class, and the outcomes have been extremely positive. There has been a poll done to find out more about There are both advantages and disadvantages to using a college attendance system.


Author(s):  
Barrie Gordon

The use of automated facial recognition in law enforcement is still a novel practice and as a result the legislative framework for this technology is ill-defined. The judgement of The Queen (on application of Edward Bridges) v The Chief Constable of South Wales Police [2020] EWCA Civ 1058 is the first case in the world that examines pertinent legal questions pertaining to this new technology. Automatic facial recognition may be used in law enforcement, but to prevent massive human rights violations, operators should perform their duties within a well-defined legal framework where discretion is kept to the minimum, and strict data-retention policies are followed. Furthermore, human oversight should always be part of an automated facial recognition system to ensure accuracy, fairness, and compliance with the law.


Our aim in this paper is to increase the accuracy of existing facial recognition system on a comparative smaller dataset as per the requirements of present day. Namely in sensitive regions. The methodology that has been adopted is by combining more than one algorithms. The feature detection capability of harr cascade along with Ada boost to fetch to Bilinear CNN so that on a comparative smaller dataset can produce comparative result as on bigger dataset.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Xuhui Fu

At present, facial recognition technology is a very cutting-edge science and technology, and it has now become a very hot research branch. In this research, first, the thesis first summarized the research status of facial recognition technology and related technologies based on visual communication and then used the OpenCV open source vision library based on the design of the system architecture and the installed system hardware conditions. The face detection program and the image matching program are realized, and the complete face recognition system based on OpenCV is realized. The experimental results show that the hardware system built by the software can realize the image capture and online recognition. The applied objects are testers. In general, the OpenCV-based face recognition system for testers can reliably, stably, and quickly realize face detection and recognition in this situation. Facial recognition works well.


Author(s):  
Syed Ibrahim ◽  
Syed Nahid Suleman ◽  
Manikanta Suthapalli ◽  
Abhishek Sharma ◽  
Shilpa K S

Organizations presently continue to encounter significant security concerns; consequently, they require much particularly trained staff to achieve the coveted protection. This staff performs blunders that may affect the extent of security. A suggested solution to the matter mentioned above is a Face Recognition Security System, which can monitor and identify trespassers to blocked or high-security areas and assist in overcoming the margin of manual human oversight. This system is comprised of two halves: the hardware part and the software part. The hardware module incorporates a camera, while the software module includes software that uses face-detection and face-recognition algorithms. If a person infiltrates the confine in question, a set of snaps are captured by the camera and dispatched to the software to be examined/identified and equated with an existent database of trusted people. An alert is conveyed to the user if the infiltrator is not recognized.


Face recognition is one of the hot topics in the current world and one of the popular topics of computer studies. Today face recognition in the network society and access to digital data is gaining more attention. The facial recognition system technology is a biometric assessment of a human's face. There are many facial recognition techniques that are intended depending on facial expressions extraction, one of which is 3D facial recognition, as well as their fusion,is difficult. During preprocessing measures for picture recognition to remove only expression-specific characteristics from the face and prevent their issues with a convolution neural network. We can also use some theorems such as LBP and Taylor's theorem to model face recognition. In particular, for cloud robots, we can also use this facial recognition on robots. The robot can perform functions and share data between servers and devices. Seven fundamental expressions are used to identify and classify: happiness, shock, fear, disgust, sadness, rage, and a neutral condition. Until now, the recognition rate is quite up to the expectation stage, but it still tries to enhance. To enhance the recognition frequency of facial image recognition, feelings are chosen by the vibrant Bayesian network technique to depict the development of facial awareness in addition to various emotional operations of facial expressions. The ICCA techniques involve various multivariate sets of distinct facial features that could be eyes, nose, and mouth.


Author(s):  
D.Manasa ◽  
N.Ramya Sri ◽  
Sk.Naveed ◽  
N.Ramya

Attendance of students in a large classroom is hard to be handled by the traditional system, as it is time-consuming and has a high probability of error during the process of inputting data into the computer. This paper proposed automated attendance marking system using face recognition technique. The system will help to find the positive and negative of the face and Eigen face algorithm for face recognition by using python programming and OpenCV library. The proposed method using PCA to resolve the problems such as lightning of the images, and the direction of the student faces. The attendance of the student was updated to the Excel sheet after student's face has been recognized. KEYWORDS: PCA, Facial Recognition, ERP, Classroom, Attendance


2020 ◽  
Vol 11 (40) ◽  
pp. 82-96
Author(s):  
Faruk AYATA ◽  
Hayati ÇAVUŞ ◽  
Mevlüt İNAN ◽  
Ebubekir SEYYARER ◽  
Emre BİÇEK ◽  
...  

Speed, time and safety are of great importance in many operations conducted today. There are standards such as ISO 27001, ITIL (Information Technologies Infrastructure Library), COBIT (Control Objectives for Information and Related Technology), which are globally recognized not only regarding access to information and the use of information but also information retention. Governmental institutions and many large companies use fingerprint, card reading, iris recognition and facial recognition systems in entrances and exits, regarding the protection of information. The facial recognition system application developed within the scope of this study performs the facial recognition by using Convolutional Neural Networks (CNN), which is one of the deep learning algorithms and restricts the use of your personal computer by people you do not know. In addition to this restriction, it takes a photo of the person who wants to use your personal computer and sends this photo to the mobile phone of the owner of the computer, who was previously defined in the system and informs him/her.Regarding the testing of the face recognition system application FEI (Faculdade de Engenharia Industrial- Faculty of Industrial Engineering) facial database was used. In this facial database, there are 14 different poses of 200 people (one is neutral, one is smiling, one is not smiling, and the others are at different angles). Trials were made to access the system with a total of 2800 photographs and as a result of the trials, success was achieved with a ratio of 76.31% in the worst angle and light and a ratio of 99.15% in the best angle and light.


Author(s):  
Anton Koshelev ◽  
Ekaterina Rusakova

A significant leap in the development of information technology over the past twenty years has made the global legal community respond to new challenges that have come along with the progress in the digital environment. Together with the convenience of using electronic resources, society has developed a need for a simple and understandable legislative regulation of legal relations arising from the use of computer information technologies and various products of electronic digital activity in order to protect their interests potentially. The concept and types of electronic evidence in civil proceedings in different countries have different meanings. Meanwhile, the regulations of their procedural admissibility and applicability differ. The common thing is the tendency towards an increase in the use of electronic information carriers in court proceedings, increasing importance for establishing specific facts, and the decisive evidentiary role in making decisions by the court. India became one of the first countries to realize the growing level of implementation of Internet technologies, electronic digital storage media, and computer dominance in society and the state's daily life [1] (Artemyeva, Y.A. et al.). The consequence of this understanding was the timely development and implementation of the substantive and procedural bases in evidence law for practical, understandable, and convenient use of electronic evidence in civil proceedings. The article examines the types and procedural status of electronic evidence and analyzes the current legislation and law enforcement practice in the admissibility and application of electronic evidence in civil proceedings in India. The study identifies the existing system of electronic evidence in the legal field of India, the determination of the advantages and disadvantages in the gathering, presentation, research, and evaluation of electronic evidence by the court in civil proceedings, as well as the identification of the procedural order for their provision. The researchers have identified the following tasks to achieve the goals: • to define and research the legislation of India governing the concept, types and procedural order of applicability and admissibility of electronic evidence in civil proceedings in India; • to develop a particular procedural order for the effective use of the institution of electronic evidence in civil litigation in India; • to identify the current trends in the gathering, presentation, research, and evaluation of electronic evidence in India's courts, based on the established judicial practice study. The research methodology is based on general theoretical and scientific methods of cognition, including abstraction and specification, analysis and synthesis, modeling and comparison, and systemic, logical, and functional analyzes. The scientific novelty of the research consists of a comprehensive study of the instruments of legal regulation of the institution of electronic evidence in India's legal field, including regulatory legal acts and judicial precedents, and a consideration of the possibility of applying Indian approaches in the jurisdictions of other countries. The analysis of legislation and jurisprudence regarding electronic evidence in India's civil proceedings was carried out using the synergistic principle of object study, statistical-sequential analysis, and empirical research method. This study's results can be used in lawmaking to develop and improve regulations regarding the procedural status and use of electronic evidence in civil litigation in any country. The reference, citation, and use of this article's conclusions and materials are permissible when conducting lectures and seminars on civil procedure and private international law, research activities, law enforcement practice, and teaching.


Sign in / Sign up

Export Citation Format

Share Document