{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,30]],"date-time":"2024-06-30T05:14:24Z","timestamp":1719724464871},"reference-count":42,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T00:00:00Z","timestamp":1697155200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Electrical and Computer Engineering"],"published-print":{"date-parts":[[2023,10,13]]},"abstract":"The process of identifying a person using their facial traits is referred to as face recognition, and it is a form of biometric identification. The use of facial recognition might range from that of an entertainment tool to one of a security tool. Even while other forms of biometric identification, such as fingerprints and iris scans, are reliable, they require the active participation of an individual. As a result, criminals cannot rely on them as the most reliable means of verification. When a criminal database, which stores the individual details of a criminal, and facial recognition technology are brought together, it can identify a criminal who is depicted in an image or seen in a video feed. Not only does a criminal recognition system needs to have a high level of accuracy, but it also needs to be able to adapt to significant changes in lighting, occlusion, aging, expressions, and other factors. In this study, they were analyzed and compared with the many methods of face detection and face recognition, such as HAAR cascades, local binary patterns histogram, support vector machines, convolutional neural networks, and ResNet-34. These methods include a variety of different approaches to recognizing faces. An analysis of these strategies is also conducted and then put into practice to those that seem to be the most effective for the designed criminal recognition system. In addition to that, a variety of uses of this criminal recognition in the real world are also discussed.<\/jats:p>","DOI":"10.1155\/2023\/4284045","type":"journal-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T20:20:07Z","timestamp":1697228407000},"page":"1-17","source":"Crossref","is-referenced-by-count":1,"title":["Design and Analysis of an Expert System for the Detection and Recognition of Criminal Faces"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1211-7989","authenticated-orcid":true,"given":"Rishi","family":"Gupta","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5345-2794","authenticated-orcid":true,"given":"Amit Kumar","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3414-5086","authenticated-orcid":true,"given":"Deepak","family":"Panwar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Manipal University Jaipur, Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-9803-0050","authenticated-orcid":true,"given":"Ashish","family":"Jain","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Manipal University Jaipur, Jaipur, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-5517-4134","authenticated-orcid":true,"given":"Partha","family":"Chakraborty","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Comilla University, Comilla, Bangladesh"}]}],"member":"98","reference":[{"key":"1","first-page":"775","article-title":"Automated criminal identification by face recognition using open computer vision classifiers","author":"P. Apoorva"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247974"},{"key":"3","first-page":"608","article-title":"An automated technique for criminal face identification using biometric approach","author":"J. Nautiyal"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000013087.49260.fb"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00290"},{"key":"6","first-page":"773","article-title":"Face detection and recognition for criminal identification system","author":"S. T. Ratnaparkhi"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1196\/1\/012010"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.26438\/ijsrcse\/v6i5.610"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1063\/1.5005335"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.35940\/ijitee.H6307.069820"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30126-4_90"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.17577\/ijertv4is030165"},{"issue":"2","key":"13","first-page":"82","article-title":"Survey: techniques for aging problems in face recognition","volume":"4","author":"S. Sahni","year":"2014","journal-title":"MIT International Journal of Computer Science and Information Technology"},{"key":"14","article-title":"Face recognition using principle component analysis","author":"K. Kim","year":"2009"},{"issue":"3","key":"15","first-page":"238","article-title":"Criminal identification system using face detection and recognition","volume":"7","author":"P. Kakkar","year":"2018","journal-title":"Int. J. Adv. Res. Comput. Commun. Eng."},{"key":"16","volume-title":"OpenCV: Cascade Classifier","author":"OpenCV","year":"2020"},{"key":"17","article-title":"Illinois DOC labeled faces dataset | Kaggle","author":"Kaggle","year":"2021"},{"key":"18","volume-title":"3D Pose Estimation and Normalization for Face Recognition","author":"T. Jebara","year":"1996"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-55426-2_90"},{"key":"20","article-title":"Real time face detection to identify criminals and missing people","author":"S. Dinkar Borse","year":"2019","journal-title":"IJSRD- International Journal for Scientific Research & Development"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2013.04.012"},{"key":"22","article-title":"Visualization of midline diastema fixing","volume":"1","author":"K. Kundu","year":"2020","journal-title":"International Journal of Engineering Research & Technology"},{"key":"23","article-title":"Face detection & face recognition using open computer vision classifies","volume":"1","author":"L. Dinalankara","year":"2017","journal-title":"ResearchGate"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/cvpr.1997.609310"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1088\/1757-899X\/732\/1\/012038"},{"key":"26","first-page":"8","article-title":"Study of different approaches to develop an automatic traffic rule violation detection system","volume":"2","author":"A. Simran","year":"2020","journal-title":"International Journal of Engineering Research and Technology"},{"key":"27","article-title":"LBPH-Based enhanced real-time face recognition","author":"F. Deeba","year":"2019"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.e1006.0585s19"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIBD.2018.8396183"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.14500\/ARO.10378"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/S41324-019-00274-0"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.C5406.029320"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.29019\/enfoque.v10n3.493"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2015907224"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2015.7280699"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1007\/11608288_3"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/IAC.2017.8280652"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416600107"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2015.2390959"},{"key":"40","article-title":"Face-recognition PyPI","author":"A. Geitgey","year":"2020"},{"key":"41","volume-title":"Understanding and Visualizing ResNets | by Pablo Ruiz | towards Data Science","author":"P. Ruiz","year":"2018"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1364\/opticaopen.22149536.v1"}],"container-title":["Journal of Electrical and Computer Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/4284045.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/4284045.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/jece\/2023\/4284045.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T20:20:14Z","timestamp":1697228414000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/jece\/2023\/4284045\/"}},"subtitle":[],"editor":[{"given":"Raid","family":"Al-Nima","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,10,13]]},"references-count":42,"alternative-id":["4284045","4284045"],"URL":"https:\/\/doi.org\/10.1155\/2023\/4284045","relation":{},"ISSN":["2090-0155","2090-0147"],"issn-type":[{"value":"2090-0155","type":"electronic"},{"value":"2090-0147","type":"print"}],"subject":[],"published":{"date-parts":[[2023,10,13]]}}}