Jaskaran Singh
Forensic Sciences, Sharda University, Indiaand
Neeta Raj Sharma
Biotechnology & BioSciences, Lovely Professional University, India
This edition first published 2022 by John Wiley & Sons, Inc., Ill River Street, Hoboken, NJ 07030, USA and Scrivener Publishing LLC, 100 Cummings Center, Suite 541J, Beverly, MA 01915, USA © 2022 Scrivener Publishing LLC
For more information about Scrivener publications please visit www.scrivenerpublishing.com.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
Wiley Global Headquarters
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and speciically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials, or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or services the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. Te advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Neither the publisher nor authors shall be liable for any loss of proit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read.
Library of Congress Cataloging-in-Publication Data
ISBN 978-1-119-76878-4
Cover image: Pixabay.Com
Cover design by Russell Richardson
Set in size of 11pt and Minion Pro by Manila Typesetting Company, Makati, Philippines Printed in the USA
10 9 8 7 6 5 4 3 2 1
Preface
This book provides an opportunity to readers in the era of digitalization of forensic science and application of Internet of Things for the provision of technical benefits to the stakeholders. IoT forensics attempts to align its workflow to that of any forensics practice—investigators identify, interpret, preserve, analyse and present any relevant data. Like any investigation, a timeline is constructed, and, with the aid of smart devices providing data, investigators might be able to capture much more specific data points than in a traditional crime.
Currently, there exists no defined and accepted standard for IoT forensic investigations. This can be attributed in part to the heterogeneous nature of IoT.
Chapters 1-8 culminates in the amalgamation of Xilix FPGA and Xilix IP cores, VANET and IOT. The application of such tools in the forensic sciences is the gist of the book. However, Chapters 9-15 discuss the core aspects of machine learning in the areas of healthcare, criminal profiling and digital cyber investigation.
Cyber and digital frauds are the hallmark of today’s era. There is an urgent need to produce knowledgeable resources for curbing such crimes; thus, this book will serve as a perfect instance for getting the best source of expertise. Additionally, it serves as a revolutionary merit for identification and apprehension of criminals in a smarter way.
Case studies related to digital and cyber forensics is a key feature of the book. The content of chapters serves as a jewel in the crown for law enforcement agencies, advocates, forensic experts and students. Hence, we hope the book is an asset for readers and users as they become aware of the ubiquitous societal issues of digital and cybercrimes. Finally, we owe a large debt of gratitude to Scrivener Publishing and Wiley and all authors of the book in particular, for their continued support and patience.
Prof. (Dr.) Anita Gehlot
Uttaranchal University, India
Prof. (Dr.) Rajesh Singh
Uttaranchal University, India
Dr. Jaskaran Singh
Sharda University, India
Dr. Neeta Raj Sharma
Lovely Professional University, India
The Editors
February 2022
1
Face Recognition–Based Surveillance System: A New Paradigm for Criminal Profiling
Payal Singh, Sneha Gupta, Vipul Gupta, Piyush Kuchhal and Arpit Jain*
Electrical and Electronics Engineering Department, UPES, Dehradun, India
Abstract
Security is the most important aspect in any spheres. We have to ensure these technologies evolve along with the advancement of various technology in the field of machine vision and artificial intelligence. The system of facial detection has become a topic of interest. It is widely used for human identification due to its capabilities that give accurate results. It is majorly used for security purposes. This manuscript provides method of face detection and its applications. Using this method, locking system will be designed to ensure safety and security in all types of places. Surveillance systems help in close observation and looking for improper behavior. Then, it performs actions on the data that has been provides to it.
Keywords: Face recognition, python, Raspberry Pi, deep learning, locking system, image processing, eigen faces, fisher faces
1.1 Introduction
Face detection is the method which is pre-owned to identify or verify an individual’s identity using their face. There can also