real time vehicle thft decline and monitoring system

advertisement
REAL TIME VEHICLE THFT DECLINE AND MONITORING SYSTEM
R. Leela prasanna1,T. Swapna Rani2
1
M.Tech, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India,
Email: leelaprasannaravuri@gmail.com
2
Assoc.Prof, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India,
Email:swapna4aruna@gmail.com
Abstract— The use of vehicles must in everyone. At the same,
protection from theft is also important. Protection of vehicle theft
can be done remotely by an authorized person. The location of
the vehicle can be found by using GPS and GSM controlled by
ARM7. In this paper face reorganization is used to identify the
person and comparison is done with preloaded faces for
authorization. The vehicle will start only when the authorized
person’s face is identified. In the event of theft attempt or
unauthorized person’s trail to drive the vehicle, an alert SMS
and EMAIL will be sent to owner along with the location. Once
the person is authorized system checks the alcohol level with the
help of breathalyzer. If the level is more than 60 percentage
system locks the vehicle and level is lesser engine will start and
the person should wear sceptical which have IR sensors to count
the eye blinks per minute to find the driver drowsiness. If the
blinks are below 20 buzzers will ring. For face recognition, a
Principal Component Analysis (PCA) algorithm is developed
using visual studio. the EMAIL sending method is written in
vb.net. the proposed application can be implemented with some
modifications in the system wherever the face recognition or
detection is needed like, airports, international borders, banking
applications ete.
Keywords— PCA, GPS, GPS, sensors (eye blink and alcohol),
ARM7.
1. INTRODUCTION
Nowadays everywhere in the world automotive accidents
and thefts are being increased. The Manufacturers are
attaining the security features of their products by introducing
advanced technologies to avoid the thefts particularly in the
case of cars. However, car thefts are increasing in number day
by day. Usually, biometric and non bio-metric methods are
used to provide such security features required. In non biometric methods, personal ID and password are used to identify
the person, where in the possibility of theft remains. Biometric methods involve no such possibilities, because, they
employ techniques such as voice recognition, fingerprint
recognition and face recognition. Of these, face recognition
and detection systems are more sophisticated.
This paper deals with design and development of real
time face recognition system using ARM7 as control platform.
This system can recognize the person who enters in to the
vehicle and it checks whether he\she is authorized or not.
When unauthorized person operates the vehicle, the GPS and
GSM modules which are attached to the system will send the
location and person’s image through SMS and EMAIL to the
owner. The camera which is installed at the ignition unit of the
vehicle will capture the photograph of the person and system
compares the same with the photos of the authorized persons
in the database in different postures, check whether it is the
image of the authorized person and not. The Principal
Component Analysis (PCA) algorithm is used for face
recognition. The PCA converts a number of possibly
correlated variables into number of uncorrelated variables
called Principal Component related to original variables by
using statistical methods.
PCA is a dimensionality reduction technique which is used
for compression and recognition problem. Motor vehicle theft
is the criminal act of stealing or attempting to steal a motor
vehicle (such as an automobile, truck, bus, coach,
motorcycle). According to NICB, National wide in 2010,
there were an estimated l.2 million motor vehicle thefts, or
approximately 416.7 motor vehicles stolen for every 100,000
inhabitants. Property losses due to motor vehicle theft in 2011
were estimated at $7.6 billion. In 2013, around 117,000 motor
vehicles worldwide were identified as stolen, thanks to the
SMV database. By the end of the year, the number of database
records had risen to more than 7.2 million. Vehicles are not
only stolen for their own sake, but are also trafficked to
finance other crimes. They can also be used as bomb carriers
or in the perpetration of other crimes. The National Insurance
Crime Bureau (NICB) is a North American non-profit
membership organization located in Des Plaines, Illinois. Yet
the stolen rate of the auto mobiles was not reduced. For that a
new method should be proposed that reduces the stolen rate
along with the thief catching technique. The main objectives
of this project are to reduce the vehicle theft ratio as well as
introduced a method for identifying and catch the thief. Fig1
shows components of proposed system.
Fig:1 block diagram of proposed system
2. SYSTEM IMPLEMENTATION
Face recognition and detection
There are many algorithms used in face recognition and
detection and many more are being developed.PCA is the best
and mostly used algorithm in face recognition. It is used for
compression and overcome many of the recognition quires
like pose variations, illumination etc. The Linear Discriminate
Analysis (LDA), and some other systems are developed by
combining different algorithms. PCA is also known as “Eigen
faces” algorithm. The main idea is de-correlate data in order
to highlight differences and similarities by finding the
principal direction (i.e, the Eigen vector) of the covariance
matrix of a multidimensional data. A part of the great
efficiency of the PCA algorithm is to take only the best
eigenvectors in order to generate the subspace (face space)
where the gallery images will be projected onto, leading to a
reduction of dimensionalities.
Principal Component Analysis
The purpose of PCA is to reduce the large dimensionality
of the data space (observed variables) to the smaller Intrinsic
dimensionality of feature space (independent variables),
which are needed to describe the data economically. The main
idea of using PCA for face recognition is to express the large
10 vector of pixels constructed from 15 facial images into the
compact principal components of the feature space. This can
be called Eigen face Projection.
3 Find covariance matrix of the matrix obtained from step 2
for this covariance matrix.
4 Find Eigen values and Eigen vectors, and then find Eigen
faces with larger Eigen values.
5 Find out weight vector using this Eigen faces
6 For new/unknown image also the process will be echoed
from step 1to3 and then find out weight vector for test image.
7 Now find Euclidian distance between weight vectors of
unknown image and database images.
8 If this distance is less than threshold then test image is
considered to be in database and hence authorized, otherwise
unauthorized.
Benefits of PCA:
1. The reduction in the dimension of the data.
2. No data redundancy, as components are orthogonal.
3. Complexity of grouping the images can be reduced.
4. Used for criminal investigation.
5.Entrance control in buildings, access control for
computers, for Automated Teller Machines, at the post offace, passport verification, and identifying the faces in a given
database.
Fig3: Proposed method circuit
3. EXPERIMENTAL RESULTS
In this project the real time face recognition is performed
using PCA method with the help of web camera.
Fig2: Flow chart of PCA algorithm
Steps of PCA:
1 Get database set of images and then find mean of the
images
2 Find the difference between mean image and each of
database images.
Fig 4: Add images into data base
CONCLUSION
Fig 5:After adding database images
This paper has been successfully designed and tested.
When compared with the existing system the advantage of this
paper is that we can prevent the vehicle theft by using face
recognition. In this paper a remote control system based on
Global System for Mobile (GSM), Global Positioning system
(GPS) and CORTEX-M3 is introduced. The system is
suitable for a real time monitoring in car security, controlling
and avoiding theft
with face recognition
and
detection.GSM/GPS has been used for the sending MMS and
knowing location of the car. By using suitable camera (3D
camera) all face recognition troubles like poor light and
background conditions, pose variations etc., will be covered.
With the adoption of standards and community awareness,
this technology will become more and more acceptable.
REFERENCES
[1]
Saurabh P.Bahurupi, D.S.Chaudhari“Principal Component Analysis for
Face Recognition “International Journal of Engineering and Advanced
Technology(IJEAT) ISSN: 2249 –8958, Volume-1, Issue-5, June 2012.
[2]
Zhang Wen, Jiang Meng” Design of Vehicle positioning System
Basedon ARM”, Business Management and Electronic Information
(BMEI), International Conference 2011 IEEE.
[3]
Jian Xiao and Haidong Feng, “A Low-cost Extendable
FrameworkforEmbedded Smart Car Security System” Proceedings of
the 2009 IEEE International Conference on Networking, Sensing and
Control,
Okayama,
Japan,
pp
829-833,
2009
[4]
Saifullah, Dr. Attaullah Khawaja, Hamza, and Arsalan, Maryam,mAnu
“Keyless Car Entry through Face Recognition Using FPGA” ,
International Conference on Future Information Technology and
Management Engineering, pp.224-227, 2010.
Chee-Ming Ting, Lih-Heng Chan, and ShHussainSalleh, "Face
Biometrics Based On Principal Component Analysis and Linear
Discriminant Analysis", Journal of Computer Science, 20 I 0, pp. 693699.
Guiming, and Zhixiong Liu, "A Vehicle Antitheft and Ala= System
Based on Computer Vision", IEEE on Electrical Systems, 2005,
pp.326-330.
Fig6 : Recognition of authorized person
Fig5&fig6 shows the screen shot after the collection of images
and recognition of authorized person.
[5]
Fig7 shows the screen shot of unauthorized person.
[6]
Author’s Details
Fig8: Alert message sent to owner mobile. Fig8 shows an alert
message sent to owner mobile. For checking the working
status of the GSM modem with the GPRS service.
Leela Prasanna Ravuri, Recevied her
B.tech degree from JNTU
Kakinada, currently pursuing her
M.tech on embedded system in CMR
College of Engineering Technology,
Hyderabad.
T. Swapna Rani,received her M.tech
degree from Osmania University,
Hyderabad, in the area of VLSI and
Embedded
Systems.
Currently
working as Assistant Professor in ECE
Dept, CMR College of Engineering
Technology, Hyderabad.
Download