An Inexpensive Security Authentication System Based on a Novel Face-Recognition Structure

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
An Inexpensive Security Authentication System
Based on a Novel Face-Recognition Structure
Shaik Meeravali1 A.Vamshidhar Reddy2 S.Sudharshan Reddy3
1. H.O.D, Professor, Dept of ECE
RRSCET, Muthangi(V), Patancheru(M), Medak(D), A.P, India.
2. Assoc. Professor, Dept of ECE
RRSCET, Muthangi(V), Patancheru(M), Medak(D), A.P, India.
3. M.Tech (E.S), Student of
RRSCET, Muthangi(V), Patancheru(M), Medak(D), A.P, India.
Abstract -- This paper presents and inexpensive security
authentication system for cars using a face recognition structure.
In this proposed embedded car security system, FDS (Face
Detection System) is used to detect the face of the driver and
compare it with the predefined face. For example, in the night
when car’s owner is sleeping and someone theft the car then FDS
obtains images by one tiny web camera which can be hidden
easily in somewhere in the car. FDS compares the obtained image
with the predefined images, if the image doesn’t match, then the
information is sent to the owner through GPS. The location of
the car as well as its speed can be displayed to the owner through
SMS. So by using the system, owner can identify the thief image
as well as the location of the car.
Keywords – Face Detection System (FDS), MMS, GPS, SMS.
In this project the car security system is approached by using
the face detection system, which is implemented by using a
web camera inside the car which continuously captures the
images of the person and if the person is not authorized then
the images captured are sent to the owner of the car through
GSM. Also the location of the car is tracked using a GPS
module and the location details are also sent through SMS.
Once the images are received by the owner he can easily track
down the car location and can stop the car immediately
through a command SMS to the module inserted in the car.
Here in the proposed system the unauthorized person images
also will be received through MMS module.
I. INDRODUCTION
The main aim of this paper is to offer an advance security
system in automotives, in which consists of a face detection
system, which detects the face of the unauthorized person
entered into the car, a web camera to capture the images, a
GPS module to track down the location of the car. A GSM
module which is to send the information of the car to the
owner. Also an MMS through which the captured image of
the unauthorized person will be sent to the owner. This entire
system is based on an embedded platform to provide smart
security for the car.
II. OVERVIEW
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4094
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
Fig.2. Person not Authorized
III. GPS MODULE
Fig.1. Block Diagram
II. FACE DETECTION SUBSYSTEM
The face detection is an important part of face recognition, but
face detection is not straight forward because of variations of
the image appearance like pose (front and non-front) and
facial expressions. There are several methods proposed to
resolve these variations in the last decade. As a result of the
research AdaBoost-face detector has came into existence
which was demonstrated by Viola and Jones. In the AdaBoost
algorithm, the faces can be detected in real time (i.e., more
than 15 frames per second on 320 by 240 images with
computers) under partial conclusion.
The AdaBoost algorithm is used to select a specified number
of classifiers with lowest error rates for each cascade and the
process is repeated until a set of optimization criteria is
satisfied.
The Global Positioning System (GPS) is a satellite based
navigation system which is used to locate the positions
anywhere on earth. Which was designed by DoD. The GPS
system consists of three basic elements, the space segment,
control segment and the user segment.
The space segment consists of up to 24 active satellites in six
orbital tracks, the satellites are not in geo-synchronous orbit
and are in constant motion relative to ground user.
The control segment contains many ground stations which
serve as uplinks to the satellite and that makes adjustments to
satellite orbits and clock.
The user segment consists of the GPS receiver which consists
of antenna, multi-channel receiver, and a processing unit.
The GPS module tracks the location of the car and sends the
latitude and longitudinal values to the owners GSM module.
In the proposed system, the image captured by the web camera
is compared with the images stored in the database and if the
image does not match then an MMS will be sent to car owner.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4095
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
The AT commands are used to control modems. AT
Commands with a GSM/GPRS modem can be used to access:
 SMS services
 MMS services
AT commands for SMS:
 AT + cimi
 AT + cmgs = “mobile number”
 At + cmgf
V. MMS MODULE
Fig.3. GPS communication
IV. GSM MODULE
A GSM is a wireless technology developed by European
Telecommunications Standards Institute (ETSI). GSM works
based on TDMA (Time Division Multiple Access). TDMA is
a channel access method for shared medium networks which
allows to share the same frequency channel by dividing the
signal into different time slots.
The Multimedia Messaging Service module is an important
emerging service, which allows the sending of multiple media
in a single message, and the ability to send a message to
multiple recipients.
An example of how to transfer a Multimedia Message
 Using an MMS compatible phone, take a photo
 Use your phone to personalize the message
 Send the MMS message
On a compatible phone, the MMS message will appear with
new message alert. The picture message will open on the
screen. The same method is used in the car security system
where the image of the unauthorized person will be sent
through MMS to the owners MMS compatible phone.
GSM standard was developed as a replacement for first
generation (1G) analog cellular networks, and originally
described a digital, circuit-switched network optimized for full
duplex voice telephony. GSM phones make use of a SIM card
to identify the user’s account. The use of the SIM card allows
GSM network users to quickly move their phone number from
one GSM phone to another by moving the SIM card .
GSM modem is the one which uses a SIM card and operates
over a subscription to a mobile operator, like a mobile phone.
The GSM modem consists of various interfaces, such as
PCMIA Type II, USB, and serial. The main difference is that
GSM modem is wireless, while dial-up modem is wired. The
GPS modems have GPRS features that can transmit data over
TCP/IP (internet). The GSM modem can be used to transmit
data like SMS (Short Message Service).
The GSM modem uses the AT
commands to transmit the messages.
Fig.4. MMS Architecture
VI. CONCLUSION
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4096
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
From this we implement face-recognition techniques that can
provide the important functions required by advanced
intelligent Car Security to avoid vehicle theft and protect the
usage of unauthenticated users.
Secured and safety environment system for automobile users
and also key points for the investigators can easily find out the
hijackers image. We can predict the theft by using this system
in our day to day life.
[13]. Sergey Kosov, Kristina Scherbaum, Kamil Faber, ThorstenThorma’hlen,
Hans-Peter Seidel, 2009, “Accurate Real-Time Disparity Estimation with
Variational Methods”, in Proc. International Symposium on Visual
Computing, pp. 796-807.
[14]. www.gsmfavorites.com
[15]. www.gpsfavorites.com
[16]. www.holtek.com
This project will help to reduce the complexity and improve
security, also much cheaper and smarter than traditional ones.
REFERENCES
[1]. Viola, P., Jones, M.: Robust real-time face detection. International Journal
of Computer Vision 57(2) (2004) 137–154.
[2]. J-C. Auber, A. Bibaut, and J-M. Rigal, Characterization of Multipath
on Land and Sea at GPS Frequencies. Elancourt, France: Thomson
CSF-Detexis, 1995.
[3]. "Telecommunications and Internet Converged Services and Protocols for
Advanced Networking
(TISPAN); Fixed network Multimedia Messaging Service (F-MMS); Part 8:
Combined PSTN/ISDN and broadband
access; Service description".
[4]. Nokia, “MMS technology tutorial.” [Online].
http://www.nokia.com/support/tutorials/MMS/en/mms.html
Available:
[5]. Andrea F.Abate, Michele Nappi, Daniel Riccio, Gabriele Sabatino, 2007,
“2D and 3D face recognition: A survey”, Pattern RecognitionLetters28, 18851906.
[6]. Rand Corporation, The Global Positioning System, Assessing National
Policies,
Appendix B, GPS History, Chronology, and Budgets, 1995.
[7] 3GPP TS 23.040, “Technical realization of the short message service
(SMS); release 5,” v5.2.0, 2001
[8] Friedhelm Hillebrand (editor): GSM and UMTS, the creation of Global
Mobile Communication, Wiley 2001
[9]. Redl, Siegmund M.; Weber, Matthias K.; Oliphant, Malcolm W
(February 1995). An Introduction to GSM. Artech House.
[10]. Hillebrand, Friedhelm, ed. (Devember 2001). GSM and UMTS, The
Creation of Global Mobile Communications. John Wiley & Sons.
[11]. Michel Mouly and Marie-Bernadette Pautet: GSM System for Mobile
Communications, published by the authors 1992, ISBN 2-9507190-0-7.
[12]. A. Abdallah. M. Abou El-Nasar, and A. Lynn Abbott, “A New Face
Detection Technique using 2D DCT and Self Organizing Feature Map” in
Proc. Of World Academy of Science, Engineering and Technology, Vol.21,
May 2007, pp. 15-19.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 4097
Download