CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Recognition of Criminal Perpetrators using Multi Otsu Thresholding and Content-based Image Retrieval Approach

by Suhenrro Y. Irianto, Sri Karnila, Adimas Aglasia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 186 - Number 7
Year of Publication: 2024
Authors: Suhenrro Y. Irianto, Sri Karnila, Adimas Aglasia
10.5120/ijca2024923433

Suhenrro Y. Irianto, Sri Karnila, Adimas Aglasia . Recognition of Criminal Perpetrators using Multi Otsu Thresholding and Content-based Image Retrieval Approach. International Journal of Computer Applications. 186, 7 ( Feb 2024), 59-63. DOI=10.5120/ijca2024923433

@article{ 10.5120/ijca2024923433,
author = { Suhenrro Y. Irianto, Sri Karnila, Adimas Aglasia },
title = { Recognition of Criminal Perpetrators using Multi Otsu Thresholding and Content-based Image Retrieval Approach },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2024 },
volume = { 186 },
number = { 7 },
month = { Feb },
year = { 2024 },
issn = { 0975-8887 },
pages = { 59-63 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume186/number7/recognition-of-criminal-perpetrators-using-multi-otsu-thresholding-and-content-based-image-retrieval-approach/ },
doi = { 10.5120/ijca2024923433 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-22T22:17:52.874857+05:30
%A Suhenrro Y. Irianto
%A Sri Karnila
%A Adimas Aglasia
%T Recognition of Criminal Perpetrators using Multi Otsu Thresholding and Content-based Image Retrieval Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 186
%N 7
%P 59-63
%D 2024
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The development of human face recognition techniques is highly complex. multidimensional. and often subject to changes based on environmental and psychological conditions. The creation of a system is urgently needed and crucial to assist law enforcement. such as determining photos of faces suspected of being involved in criminal activities. With automated tools. it becomes possible to provide or display suspected faces in accordance with desired queries. In the legal domain. searching for the faces of criminals or fugitives is essential because not all criminal activities are captured by CCTV and other means. Therefore. sketch images based on eyewitness accounts are employed. Law enforcement typically seeks the assistance of skilled artists. especially facial sketch artists. to create facial sketches of criminal suspects based on information provided by eyewitnesses. even if only briefly observed. Developing a system for searching facial images using sketches by artists is immensely helpful in identifying criminal suspects and enables law enforcement to pinpoint individuals or groups under suspicion. Overall. out of 400 face images. 328 are correctly matched. and 72 are unmatched. The overall precision for the entire dataset is 82%. In This research employs two methods for creating a criminal face recognition system. namely. segmentation and Content-Based Image Retrieval (CBIR).

References
  1. O. R. Shahin, R. Ayedi, A. Rayan, R. M. A. El-Aziz, and A. I. Taloba, “Human Face Recognition from Part of a Facial Image based on Image Stitching,” International Journal of Advanced Computer Science and Applications, vol. 12, no. 12, 2021, doi: 10.14569/IJACSA.2021.0121260.
  2. Umar Aditiawarman, Dimas Erlangga, Teddy Mantoro, and Lutfil Khakim, “Face Recognition of Indonesia’s Top Government Officials Using Deep Convolutional Neural Network,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 7, no. 1, 2023, doi: 10.29207/resti.v7i1.4437.
  3. S. Setumin and S. A. Suandi, “Cascaded Static and Dynamic Local Feature Extractions for Face Sketch to Photo Matching,” IEEE Access, vol. 7, 2019, doi: 10.1109/ACCESS.2019.2897599.
  4. N. Lakshmi and M. P. Arakeri, “A novel sketch based face recognition in unconstrained video for criminal investigation,” International Journal of Electrical and Computer Engineering, vol. 13, no. 2, 2023, doi: 10.11591/ijece.v13i2.pp1499-1509.
  5. C. Benavides Alvarez, J. Villegas Cortez, G. Roman Alonso, and C. Aviles Cruz, “Face Classification by Local Texture Analisys through CBIR and SURF Points,” IEEE Latin America Transactions, vol. 14, no. 5, 2016, doi: 10.1109/TLA.2016.7530440.
  6. V. Tyagi, Understanding Digital Image Processing. CRC Press, 2018. doi: 10.1201/9781315123905.
  7. G. K. Wallace, “The JPEG Still Picture Compression Standard,” Commun ACM, vol. 34, no. 4, 1991, doi: 10.1145/103085.103089.
  8. G. K. Wallace, “The JPEG still picture compression standard,” IEEE Transactions on Consumer Electronics, vol. 38, no. 1, 1992, doi: 10.1109/30.125072.
  9. M. Fachrurrozi et al., “Real-time multi-object face recognition using content based image retrieval (CBIR),” International Journal of Electrical and Computer Engineering, vol. 8, no. 5, 2018, doi: 10.11591/ijece.v8i5.pp.2812-2817.
  10. M. Fachrurrozi et al., “Real-time Multi-object Face Recognition Using Content Based Image Retrieval (CBIR),” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, 2018, doi: 10.11591/ijece.v8i5.pp2812-2817.
  11. M. I. Wahyudi, E. W. Wibowo, and S. Sopiullah, “Web-Based Face Recognition using Line Edge Detection and Euclidean Distance Method,” Edumatic: Jurnal Pendidikan Informatika, vol. 6, no. 1, 2022, doi: 10.29408/edumatic.v6i1.5525.
  12. H. Yasin and S. Hayat, “DeepSegment: Segmentation of motion capture data using deep convolutional neural network,” Image Vis Comput, vol. 109, 2021, doi: 10.1016/j.imavis.2021.104147.
  13. Z. Wang, K. Wang, F. Yang, S. Pan, and Y. Han, “Image segmentation of overlapping leaves based on Chan–Vese model and Sobel operator,” Information Processing in Agriculture, vol. 5, no. 1, 2018, doi: 10.1016/j.inpa.2017.09.005.
  14. M. H. J. Vala and A. Baxi, “A review on Otsu image segmentation algorithm,” International Journal of Advanced Research in Computer Engineering and Technology, vol. 2, no. 2, 2013.
  15. S. Sikandar, R. Mahum, and A. M. Alsalman, “A Novel Hybrid Approach for a Content-Based Image Retrieval Using Feature Fusion,” Applied Sciences (Switzerland), vol. 13, no. 7, 2023, doi: 10.3390/app13074581.
  16. S. Maji and S. Bose, “CBIR Using Features Derived by Deep Learning,” ACM/IMS Transactions on Data Science, vol. 2, no. 3, 2021, doi: 10.1145/3470568.
  17. Z. Y. Tan, S. N. Basah, H. Yazid, and M. J. A. Safar, “Performance analysis of Otsu thresholding for sign language segmentation,” Multimed Tools Appl, vol. 80, no. 14, 2021, doi: 10.1007/s11042-021-10688-4.
  18. A. M. Alhassan, “Enhanced Fuzzy Elephant Herding Optimization-Based OTSU Segmentation and Deep Learning for Alzheimer’s Disease Diagnosis,” Mathematics, vol. 10, no. 8, 2022, doi: 10.3390/math10081259.
Index Terms

Computer Science
Information Sciences
Computer vision. image processing.
image segmentation

Keywords

Face recognition. CBIR. Criminal Sketch Images