Functional Requirement
Functional Requirement
SOFTWARE REQUIREMENT
Our proposed system of Face detection and recognition software requires are
Python
Tensor Flow
Anaconda
crypto
PYTHON
Python is an interpreted high-level programming language for general-purpose programming.
Created by Guido van Rossum and first released in 1991, Python has a design philosophy that
emphasizes code readability, notably using significant whitespace. It provides constructs that
enables clear programming in small and large scales. Python features a dynamic type system and
automatic memory management. It supports multiple programming paradigms, including object-
oriented, imperative, functional and procedural, and has a large and comprehensive standard library.
TENSOR FLOW
Tensor Flow is an open-source software library for dataflow programming across a range of tasks. It
is a symbolic math library and is also used for machine learning applications such as neural
networks. It is used for both research and production at Google often replacing its closed-source
predecessor, Disbelief. Tensor Flow was developed by the Google Brain team for internal Google
use. It was released under the Apache 2.0 open source license on November 9, 2015.
ANACONDA
Conda is an open source platform. Language package manager and environment management
system. It is released under the Berkely Software Distribution License by Continum Analysis. [6]
Conda allows user to easily install different versions of binary software packages and any required
libraries appropriate for their computing platform [6]. Also, it allows user to switch between cannot.
Versions and download and install updates from a software repository.
Conda is written in the Python programming language, but can manage projects containing code
written in other language (e.g. R), including multi-language projects. Conda can install the python
programming language, while similar Python-based cross-platform package managers (such as
wheel or pip) cannot.
Crypto
It is a Python Cryptography Toolkit which is the collection of cryptographic modules implementing
various algorithms and protocols.
FUNCTIONAL REQUIREMENT
CLOUD STORAGE
Then the encrypted data are stored in the cloud more securely then the normal way.
PERMISSION ACCESS
Our software will only give access to cloud only to authorized user. Authorized user are verified
by a face recognition.
DECRYPTION
For decryption we apply the same algorithm used in encryption phenomenon in a reverse order.
Based on the detected face the system should recognize whether a detected face belongs to the data
base or not.