skip to main content
10.1145/3592307.3592309acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiceccConference Proceedingsconference-collections
research-article

Face Recognition (FR) Integration on MABIS: A Mobile Automated Biometric Identification System for Law Enforcement in the Philippines

Published:14 August 2023Publication History

ABSTRACT

The Philippines is a southeastern Asian archipelago of over 7,640 islands. The Philippine National Police (PNP) is tasked with upholding the law, preventing and controlling crime, maintaining peace and order, and ensuring public safety and internal security with the active support of the community. Currently, the country has 1,766 police stations. Criminal identification procedures take time to complete due to geographical challenges. To address such challenges, the Mobile Automated Fingerprint Identification System (MAFIS) was developed. The integration of face recognition with the existing MAFIS makes it MABIS, a Mobile Automated Biometric Identification System. The MABIS allows law enforcers to use both fingerprint and face recognition to identify law offenders by searching the criminal database for existing records. If found, criminal records will be retrieved for investigation and referenced. If no information is found, a new record will be added. The goal of the paper is to integrate a Face Recognition (FR) system into an existing MAFIS by employing an open-source facial recognition service.

References

  1. J. E. M. Angara, "An Act Establishing a National Crime Database," Republic of the Philippines Congress, Manila, Philippines, 2013.Google ScholarGoogle Scholar
  2. W. P. Rey & G. Rolluqui, "Mobile Automated Fingerprint Identification System (MAFIS): An Android-based Criminal Tracking System using Fingerprint Minutiae Structure," 2021 5th International Conference on E-Society, E-Education and E-Technology (ICSET 2021), Taipei, Taiwan, 2021. DOI: 10.1145/3485768.3485773Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. W.P. Rey & M.A. Baccay, “MAFIS Overlay Network: Towards a Secure Network for Mobile Automated Fingerprint Identification System over Virtual Private Network (VPN),” ICCBN 2022: 2022 10th International Conference on Communications and Broadband Networking (ICCBN). February 2022 Pages 20–27. https://doi.org/10.1145/3538806.3538812Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W.P. Rey & R. Juanatas, “Towards a Performance Optimization of Mobile Automated Fingerprint Identification System (MAFIS) for the Philippine National Police”. ICCAI '22: Proceedings of the 8th International Conference on Computing and Artificial Intelligence, March 2022. Pages 380–386. https://doi.org/10.1145/3532213.3532270Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jain, A.K. and Li, SZ, 2011. Handbook of Face Recognition. New York: Springer London. https://doi.org/10.1007/978-0-85729-932-1Google ScholarGoogle ScholarCross RefCross Ref
  6. Martinez A.M. (2009) Face Recognition, Overview. In: Li S.Z., Jain A. (eds) Encyclopedia of Biometrics. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-73003-5_84.Google ScholarGoogle ScholarCross RefCross Ref
  7. Kakkar, Piyush and Sharma, Vibhor. "Criminal Identification System Using Face Detection and Recognition." International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), Vol. 7, Issue 3, March 2018.Google ScholarGoogle Scholar
  8. M. H. Yang, D. J. Kriegman & N. Ahuja, "Detecting Faces in Images: A Survey," IEEE Transaction on Pattern Analysis & Machine Intelligence, 24:1, (2002), pp. 34-58. DOI:10.1109/34.982883Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. M. Corcoran & C. Iancu, "Automatic Face Recognition System for Hidden Markov Model Techniques," New Approaches to Characterization and Recognition of Faces, (2011). DOI:10.5772/17694Google ScholarGoogle ScholarCross RefCross Ref
  10. Akshat Agarwal and Ipshita Biswas. "The fundamentals of facial recognition," Technical Article, Embedded Cambridge, MA 02142 USA. Website: https://www.embedded.com/the-fundamentals-of-facial-recognition/Google ScholarGoogle Scholar
  11. Exadel, "Open-Source Face Recognition Service" Available: https://exadel.com/solutions/compreface/, Accessed on: March 21, 2022Google ScholarGoogle Scholar
  12. J. Deng, J. Guo, N. Xue, S. Zafeiriou, "ArcFace: Additive Angular Margin Loss for Deep Face Recognition", in: 2019 IEEE/CVF conference on computer vision and pattern recognition (CVPR). Long Beach, CA: IEEE; 2019. pp. 4685–4694.Google ScholarGoogle ScholarCross RefCross Ref
  13. I. Masi, AT Tran, T. Hassner, JT Leksut, G. Medioni, "Do We Really Need to Collect Millions of Faces for Effective Face Recognition?", in: Leibe B, Matas J, Sebe N, Welling M, editors. European conference on computer vision (ECCV). Cham, Switzerland: Springer; 2016. pp. 579–596.Google ScholarGoogle Scholar
  14. C. Ding and D. Tao, "Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 40, no. 4, pp. 1002-1014, 1 April 2018, doi: 10.1109/TPAMI.2017.2700390.Google ScholarGoogle ScholarCross RefCross Ref
  15. D. S. AbdELminaam, A. M. Almansori, M. Taha, and E. Badr, "A Deep Facial Recognition System using Computational Intelligent Algorithms", PLOS ONE, December 2020, doi: 10.1371/journal.pone.0242269Google ScholarGoogle ScholarCross RefCross Ref
  16. Khan, Zubair Ahmed and Rizvi, Asma. "AI-Based Facial Recognition Technology and Criminal Justice: Issues and Challenges." Turkish Journal of Computer and Mathematics Education, Vol.12 No.14 (2021), 3384-3392.Google ScholarGoogle Scholar
  17. Li, Jessica. “Labelled Faces in the Wild (LFW) Dataset”. Kaggle.com. Accessed from: https://www.kaggle.com/datasets/jessicali9530/lfw-datasetGoogle ScholarGoogle Scholar

Index Terms

  1. Face Recognition (FR) Integration on MABIS: A Mobile Automated Biometric Identification System for Law Enforcement in the Philippines

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICECC '23: Proceedings of the 2023 6th International Conference on Electronics, Communications and Control Engineering
      March 2023
      316 pages
      ISBN:9798400700002
      DOI:10.1145/3592307

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 14 August 2023

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format