SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 4, Issue 2 (Sep-Oct. 2012), PP 31-34
www.iosrjournals.org
www.iosrjournals.org 31 | Page
Car Theft Identification, Tracking and Control System
1
Nithin Kurup U.G (M.Tech), 2
G.Vara Lakshmi
1
Computer Science and Engineering Aurora’s Technological and Research Institute Parvathapur, Uppal,
Hyderabad, India
2
Associate Professor Aurora’s Technological and Research Institute Parvathapur, Uppal, Hyderabad, India
Abstract: This paper proposes an integrated system consisting of a GPS (Global positioning System) module,
an Android mobile phone. and a Control system to be used in cars for theft Identification, tracking and
controlling.PCA (Principal Component Analysis) is used for FRS(Face Recognition System). If the car seems to
be theft, the owner will be conveyed with image of the thief and latitude and longitude information through
MMS (Multimedia Messaging Service) and SMS (Short Messaging Service). The Short Messaging Service will
send to owner’s mobile periodically and on receiving the SMS the owner has to send a secret code through SMS
to the car, then the car will stop immediately; for that a Microcontroller has to be placed in the car which will
stop the car by using the relay system in the car. This is cheaper and reliable one.
Keywords- Global positioning System, Android mobile phone, Control system, Principal Component Analysis,
Multimedia Messaging Service, Short Messaging Service.
I. Introduction
Today car security is one of the challenging issues in our society. Biometric recognition, image
processing, communication etc are the currently using techniques. All these security system using many sensors,
so the cost of implementation is high.
The car consists of a tiny digital camera, GPS(Global Positioning System) module, a GSM(Global
System for Mobile Communication) module and a control system .Control system mainly consists of a
microcontroller, RS-232(Recommended Standard-232) Cables ,MAX232 IC,power supply. The PCA (Principal
Component Analysis) algorithm have been first profiled in MATLAB (Matrix laboratory) and then implemented
on ANDROID phone.
When car is theft by somebody then the FRS (Face Recognition System) obtains face images by tiny
digital camera which can hide easily somewhere in the car.PCA will matches the captured face image with
library of known faces. Known faces means already some of the face images will be store in Android phone like
owners face image If the face images are not matched then a MMS (Multimedia Messaging Service),
SMS(Short Messaging Service) will be sent to owners mobile.MMS contains the captured face image nothing
but thief image.SMS contains the latitude and longitude information of car.SMS will be sent from car
periodically to owners mobile. Once the owner is sends secret code through SMS the car will stop immediately
and the SMS sending from the car to owner’s mobile will be throttle down. The integer values are used for
secret code.
Fig.1. Block diagram of car security system
All steps are controlled by the microcontroller in control system, including capturing images, face recognition,
getting GPS information, sending MMS, SMS, stopping the car.
II. Face Recognition
Face recognition algorithms are used in a wide range of applications viz., security control, crime
investigation, and entrance control in buildings, access control at automatic teller machines, passport
verification, identifying the faces in a given databases.
Car Theft Identification, Tracking And Control System
www.iosrjournals.org 32 | Page
The Principal Component Analysis (PCA) approach is also known as Eigen faces. PCA is a useful
statistical technique that has found application in fields such as face recognition and image compression, and is
a common technique for finding patterns in data of high dimension. The basic goal is to implement a simple face
recognition system, based on well-studied and well-understood methods. One can choose to go into depth
of one and only one of those methods. The method to be implemented is PCA(Principle Component
Analysis). It is one of the most successful techniques of face recognition and easy to understand and describe
using mathematics. This method involves the Eigen faces.
In PCA the first step is to produce a feature detector (dimension reduction).Principal Components
Analysis (PCA) was chosen because it is the most efficient technique, of dimension reduction, in terms of data
compression. This allows the high dimension data, the images, to be represented by lower dimension data
and so hopefully reducing the complexity of grouping the images
2.1 Methodology
2.1.1 Data Acquisition
A database of different image sets of faces was constructed. It’s only got 2 dimensions, and the reason
why one can have chosen this is so that one can provide plots of the data to show what the PCA analysis is
doing at each step.
2.2 Subtract the mean image data
For PCA to work properly, you have to subtract the mean from each of the data dimensions. The mean
subtracted is the average across each dimension. So, all the x values have x’ (the mean of the x values of all
the data points) subtracted, and all the y values have y’ subtracted from them. This produces a data set whose
mean is zero.
2.3 Find the covariance matrix
Covariance is always measured between 2 dimensions. The data is 2 dimensional the covariance matrix
will be 2 * 2 as shown :
Fig.2: A plot of the normalized data (mean Subtracted) with the Eigen vectors of the covariance matrix.
2.2.2 Face Recognition Process in Eigen faces Approach.
Step 1. Build a face database that consists of the face images of car owner and relatives.
Step 2. Choose a training set that includes a number of images (M) for each person with some variation in pose
and different faces.
Step 3. Calculate the M x M matrix L, find its Eigen vectors and Eigen values, and choose the M' Eigen
vectors with the highest associated Eigen values..
Step 4. Combine the normalized training set of images to produce M' Eigen faces.
Step 5. Store these Eigen faces for later use.
Step 6. For each member in the face database, compute and store a feature vector.
Step 7. Choose a threshold value e that defines the maximum allowable distance from any face class.
Optionally choose a threshold f that defines the maximum allowable distance from face space.
Step 8. For each new face image i.e. images captured by tiny digital camera in car to be identified, calculate
its feature vector and compare it with the stored feature vectors of the face library members.
Step 9. If the comparison satisfies the threshold for at least one member, then classify this face image as
"known", otherwise a miss has occurred and classify it as "unknown" and add this member to the face library
with its feature vector.
Car Theft Identification, Tracking And Control System
www.iosrjournals.org 33 | Page
Fig.3. Face recognition based on PCA
III. Gps Module
GPS(Global Positioning System) technique has been widely used in military equipments and civil
devices. Jupiter TU30 GPS module is used to find out the location of car in time.GPS module has a RS-232
(Recommended Standard)cable, which can be used to communicate with many other devices like
microcontroller etc in Control System.It is easy to get details like longitude,latitude,speed and other information
of car. Based up on the above information received from TU30 GPS module the owner of the car can identify
the precise location of car.
IV. Conclusion And Future Work
In this security implementation of car consist of Face Recognition,GPS module, Control System,MMS
and SMS sending features,is to avoid car theft and protect the usage of unauthenticated users.
Fig4-captured image of a person at the time of Face Recognition using tiny digital camera.
Secured and safety environment system for automobile users and also key points for the investigators can easily
find out the hijackers image. We can predict the theft by using this system in our day to day life, and using
mobile phone car can stop.
In future in addition to MMS,SMS like to add recorded audio telephonic call that means after sending
MMS from car automatically a telephonic call will go to owners mobile with already recorded audio. In future it
will get its applicability in almost all security systems including organizations and automobiles.
V. Acknowledgment
I express my earnest and deep sense of gratitude to Mrs.D.Sujatha, Head Of the Department, Computer
Science and Engineering without her valuable suggestions and guidance, preparation of this Paper wouldn’t
have been possible. It was a great pleasure and honor to work under her and i hope many more fruitful
associations in the years to come. Her kindness and affection will remain with me forever. I also owe the
gratitude due towards S.Siva Sankar Rao Lecturer, Coordinator for me. And I would like to thank my guide
G.Varalakshmi and other faculty members of ATRI college, for their noteworthy suggestions and
encouragement given to me in completing the paper.I would also like to thanks the members of PRC(Project
Review Committee) for their help, through provoking discussions invigorating suggestions extended to me with
immense care, zeal throughout the work.
Car Theft Identification, Tracking And Control System
www.iosrjournals.org 34 | Page
References
[1] Ahmet Bahtiyar Gul “Holistic Face recognition by Dimension reduction”, May 2002.
[2] Dr.Ch.D.V.Subba Rao ,Srinivasulu Asadi,V.Saikrishna (2010) A Comparative study of Face Recognition with Principal Component
Analysis and Cross-Correlation Technique. International Journal of Computer Applications Volume 10– No.8, November 2010
[3] Goldberg D.E, “Genetic algorithms in search, optimization,and machine learning” Addison-Wesley, 1989.
[4] Gonzales, R and Woods R,”Digital Image Processing, 2nd Edition Prentice-Hall Englewoodcliffs, NJ, 2002.
[5] Joseph A. O'Sullivan, Robert Pless, “Advances in Security Technologies: Imaging, Anomaly Detection, and Target and
Biometric Recognition”, Microwave Symposium IEEE/MTT-S International Volume, Page(s):761 – 764, 2007.
[6] PU Han-lai, LING Ming, “Performance Oriented Customization of On-Chip Memory Capacity” Journal of Applied Sciences, p.
364, 2005.
[7] S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z. Mushtaq,“Autonomous Vehicle Monitoring & Tracking System,”
SCONEST 2005, pp. 1 – 4,2005.
[8] Zhang Yu, “Research on High Level Model and Performance Estimation” Southeast University PHD thesis, 2007.
NITHIN KURUP U.G born on August 08th 1984.He is pursuing M.Tech (Computer Science and
Engineering) specialization at Aurora’s Technological and Research Institute, Hyderabad, India Affiliated
to JNTU-Hyderabad . His expertise includes Mobile Computing , Computer Networks.

Weitere ähnliche Inhalte

Was ist angesagt?

An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemIJERDJOURNAL
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...IJECEIAES
 
IRJET- Sign Language and Gesture Recognition for Deaf and Dumb People
IRJET-  	  Sign Language and Gesture Recognition for Deaf and Dumb PeopleIRJET-  	  Sign Language and Gesture Recognition for Deaf and Dumb People
IRJET- Sign Language and Gesture Recognition for Deaf and Dumb PeopleIRJET Journal
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...IOSR Journals
 
Research ppr
Research pprResearch ppr
Research pprSara Sahu
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...IJCSIS Research Publications
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Passwordijceronline
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPIJCSIS Research Publications
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemConference Papers
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewakshay hebbar
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
IRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine LearningIRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine LearningIRJET Journal
 
Machine Learning approach for Assisting Visually Impaired
Machine Learning approach for Assisting Visually ImpairedMachine Learning approach for Assisting Visually Impaired
Machine Learning approach for Assisting Visually ImpairedIJTET Journal
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET Journal
 

Was ist angesagt? (20)

An Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance SystemAn Iot Based Smart Manifold Attendance System
An Iot Based Smart Manifold Attendance System
 
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
Engfi Gate: An Indoor Guidance System using Marker-based Cyber-Physical Augme...
 
Paper
PaperPaper
Paper
 
IRJET- Sign Language and Gesture Recognition for Deaf and Dumb People
IRJET-  	  Sign Language and Gesture Recognition for Deaf and Dumb PeopleIRJET-  	  Sign Language and Gesture Recognition for Deaf and Dumb People
IRJET- Sign Language and Gesture Recognition for Deaf and Dumb People
 
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
Digital Pen for Handwritten Digit and Gesture Recognition Using Trajectory Re...
 
Research ppr
Research pprResearch ppr
Research ppr
 
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
Enhancement of Shoulder-Surfing Resistant Graphical Password Scheme for Cloud...
 
Authentication Using Graphical Password
Authentication Using Graphical PasswordAuthentication Using Graphical Password
Authentication Using Graphical Password
 
Persuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTPPersuasive Cued Click Point Password with OTP
Persuasive Cued Click Point Password with OTP
 
G45023236
G45023236G45023236
G45023236
 
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care systemMi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
 
AADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - reviewAADHAR based Electronic Voting Machine using Arduino - review
AADHAR based Electronic Voting Machine using Arduino - review
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
IRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine LearningIRJET- ATM Security using Machine Learning
IRJET- ATM Security using Machine Learning
 
Machine Learning approach for Assisting Visually Impaired
Machine Learning approach for Assisting Visually ImpairedMachine Learning approach for Assisting Visually Impaired
Machine Learning approach for Assisting Visually Impaired
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
Fingerprints recognition
Fingerprints recognitionFingerprints recognition
Fingerprints recognition
 
IRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: SurveyIRJET- Smart Classroom Attendance System: Survey
IRJET- Smart Classroom Attendance System: Survey
 

Andere mochten auch

A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsIOSR Journals
 
Synthesis and structural characterization of Al-CNT metal matrix composite us...
Synthesis and structural characterization of Al-CNT metal matrix composite us...Synthesis and structural characterization of Al-CNT metal matrix composite us...
Synthesis and structural characterization of Al-CNT metal matrix composite us...IOSR Journals
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of SteganographyIOSR Journals
 
Convolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesConvolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesIOSR Journals
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...IOSR Journals
 
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...IOSR Journals
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...IOSR Journals
 
Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...IOSR Journals
 
An Efficient Algorithm for the Segmentation of Astronomical Images
An Efficient Algorithm for the Segmentation of Astronomical  ImagesAn Efficient Algorithm for the Segmentation of Astronomical  Images
An Efficient Algorithm for the Segmentation of Astronomical ImagesIOSR Journals
 
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...IOSR Journals
 
Using Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesUsing Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesIOSR Journals
 
Interference Aware & SINR Estimation in Femtocell Networks
Interference Aware & SINR Estimation in Femtocell NetworksInterference Aware & SINR Estimation in Femtocell Networks
Interference Aware & SINR Estimation in Femtocell NetworksIOSR Journals
 
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...IOSR Journals
 
Software effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkSoftware effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkIOSR Journals
 
Spatio-Temporal Database and Its Models: A Review
Spatio-Temporal Database and Its Models: A ReviewSpatio-Temporal Database and Its Models: A Review
Spatio-Temporal Database and Its Models: A ReviewIOSR Journals
 

Andere mochten auch (20)

A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human Fingerprints
 
Synthesis and structural characterization of Al-CNT metal matrix composite us...
Synthesis and structural characterization of Al-CNT metal matrix composite us...Synthesis and structural characterization of Al-CNT metal matrix composite us...
Synthesis and structural characterization of Al-CNT metal matrix composite us...
 
An Overview of Steganography
An Overview of SteganographyAn Overview of Steganography
An Overview of Steganography
 
Convolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their PropertiesConvolution Theorem for Canonical Cosine Transform and Their Properties
Convolution Theorem for Canonical Cosine Transform and Their Properties
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
 
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
Hardy-Steklov operator on two exponent Lorentz spaces for non-decreasing func...
 
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...Implementation of Knowledge Based Authentication System Using Persuasive Cued...
Implementation of Knowledge Based Authentication System Using Persuasive Cued...
 
Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...
 
An Efficient Algorithm for the Segmentation of Astronomical Images
An Efficient Algorithm for the Segmentation of Astronomical  ImagesAn Efficient Algorithm for the Segmentation of Astronomical  Images
An Efficient Algorithm for the Segmentation of Astronomical Images
 
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
Model-based Approach of Controller Design for a FOPTD System and its Real Tim...
 
N010428796
N010428796N010428796
N010428796
 
Using Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood ImagesUsing Aspect Ratio to Classify Red Blood Images
Using Aspect Ratio to Classify Red Blood Images
 
O01213106111
O01213106111O01213106111
O01213106111
 
I010216266
I010216266I010216266
I010216266
 
C010431520
C010431520C010431520
C010431520
 
Interference Aware & SINR Estimation in Femtocell Networks
Interference Aware & SINR Estimation in Femtocell NetworksInterference Aware & SINR Estimation in Femtocell Networks
Interference Aware & SINR Estimation in Femtocell Networks
 
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...
Modified Distributive Arithmetic Based DWT-IDWT Processor Design and FPGA Imp...
 
Software effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN networkSoftware effort estimation through clustering techniques of RBFN network
Software effort estimation through clustering techniques of RBFN network
 
B0141020
B0141020B0141020
B0141020
 
Spatio-Temporal Database and Its Models: A Review
Spatio-Temporal Database and Its Models: A ReviewSpatio-Temporal Database and Its Models: A Review
Spatio-Temporal Database and Its Models: A Review
 

Ă„hnlich wie F0423134

IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial IntelligenceIRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial IntelligenceIRJET Journal
 
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...ijtsrd
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET Journal
 
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...IRJET Journal
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 
Number Plate Recognition System
Number Plate Recognition System Number Plate Recognition System
Number Plate Recognition System Aditya Mishra
 
Automated License Plate Recognition for Toll Booth Application
Automated License Plate Recognition for Toll Booth ApplicationAutomated License Plate Recognition for Toll Booth Application
Automated License Plate Recognition for Toll Booth ApplicationIJERA Editor
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTIRJET Journal
 
IRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET Journal
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification ToolIRJET Journal
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Makerijtsrd
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition Systemprashantdahake
 
IRJET - Traffic Rules Violation Detection System
IRJET - Traffic Rules Violation Detection SystemIRJET - Traffic Rules Violation Detection System
IRJET - Traffic Rules Violation Detection SystemIRJET Journal
 
A Review: Machine vision and its Applications
A Review: Machine vision and its ApplicationsA Review: Machine vision and its Applications
A Review: Machine vision and its ApplicationsIOSR Journals
 
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic ControlNeural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Controlijseajournal
 
3M Secure Transportation System.
3M Secure Transportation System.3M Secure Transportation System.
3M Secure Transportation System.IRJET Journal
 
TRAFFIC RULES VIOLATION DETECTION SYSTEM
TRAFFIC RULES VIOLATION DETECTION SYSTEMTRAFFIC RULES VIOLATION DETECTION SYSTEM
TRAFFIC RULES VIOLATION DETECTION SYSTEMIRJET Journal
 

Ă„hnlich wie F0423134 (20)

IRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial IntelligenceIRJET- Advance Driver Assistance System using Artificial Intelligence
IRJET- Advance Driver Assistance System using Artificial Intelligence
 
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
Traffic Light Detection and Recognition for Self Driving Cars using Deep Lear...
 
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing TechniqueIRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
IRJET- Vehicle Seat Vacancy Identification using Image Processing Technique
 
S0102297102
S0102297102S0102297102
S0102297102
 
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
A review study on Vehicle Anti-Theft Immobilization System using Face Recogni...
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 
Number Plate Recognition System
Number Plate Recognition System Number Plate Recognition System
Number Plate Recognition System
 
Automated License Plate Recognition for Toll Booth Application
Automated License Plate Recognition for Toll Booth ApplicationAutomated License Plate Recognition for Toll Booth Application
Automated License Plate Recognition for Toll Booth Application
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoT
 
IRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security SystemIRJET-A review of Face Recognition Based Car Ignition and Security System
IRJET-A review of Face Recognition Based Car Ignition and Security System
 
Person Acquisition and Identification Tool
Person Acquisition and Identification ToolPerson Acquisition and Identification Tool
Person Acquisition and Identification Tool
 
A Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage MakerA Traffic Sign Classifier Model using Sage Maker
A Traffic Sign Classifier Model using Sage Maker
 
Vehicle Number Plate Recognition System
Vehicle Number Plate Recognition SystemVehicle Number Plate Recognition System
Vehicle Number Plate Recognition System
 
IRJET - Traffic Rules Violation Detection System
IRJET - Traffic Rules Violation Detection SystemIRJET - Traffic Rules Violation Detection System
IRJET - Traffic Rules Violation Detection System
 
A Review: Machine vision and its Applications
A Review: Machine vision and its ApplicationsA Review: Machine vision and its Applications
A Review: Machine vision and its Applications
 
Ijetcas14 395
Ijetcas14 395Ijetcas14 395
Ijetcas14 395
 
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic ControlNeural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control
 
3M Secure Transportation System.
3M Secure Transportation System.3M Secure Transportation System.
3M Secure Transportation System.
 
TRAFFIC RULES VIOLATION DETECTION SYSTEM
TRAFFIC RULES VIOLATION DETECTION SYSTEMTRAFFIC RULES VIOLATION DETECTION SYSTEM
TRAFFIC RULES VIOLATION DETECTION SYSTEM
 

Mehr von IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

KĂĽrzlich hochgeladen

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

KĂĽrzlich hochgeladen (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

F0423134

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 4, Issue 2 (Sep-Oct. 2012), PP 31-34 www.iosrjournals.org www.iosrjournals.org 31 | Page Car Theft Identification, Tracking and Control System 1 Nithin Kurup U.G (M.Tech), 2 G.Vara Lakshmi 1 Computer Science and Engineering Aurora’s Technological and Research Institute Parvathapur, Uppal, Hyderabad, India 2 Associate Professor Aurora’s Technological and Research Institute Parvathapur, Uppal, Hyderabad, India Abstract: This paper proposes an integrated system consisting of a GPS (Global positioning System) module, an Android mobile phone. and a Control system to be used in cars for theft Identification, tracking and controlling.PCA (Principal Component Analysis) is used for FRS(Face Recognition System). If the car seems to be theft, the owner will be conveyed with image of the thief and latitude and longitude information through MMS (Multimedia Messaging Service) and SMS (Short Messaging Service). The Short Messaging Service will send to owner’s mobile periodically and on receiving the SMS the owner has to send a secret code through SMS to the car, then the car will stop immediately; for that a Microcontroller has to be placed in the car which will stop the car by using the relay system in the car. This is cheaper and reliable one. Keywords- Global positioning System, Android mobile phone, Control system, Principal Component Analysis, Multimedia Messaging Service, Short Messaging Service. I. Introduction Today car security is one of the challenging issues in our society. Biometric recognition, image processing, communication etc are the currently using techniques. All these security system using many sensors, so the cost of implementation is high. The car consists of a tiny digital camera, GPS(Global Positioning System) module, a GSM(Global System for Mobile Communication) module and a control system .Control system mainly consists of a microcontroller, RS-232(Recommended Standard-232) Cables ,MAX232 IC,power supply. The PCA (Principal Component Analysis) algorithm have been first profiled in MATLAB (Matrix laboratory) and then implemented on ANDROID phone. When car is theft by somebody then the FRS (Face Recognition System) obtains face images by tiny digital camera which can hide easily somewhere in the car.PCA will matches the captured face image with library of known faces. Known faces means already some of the face images will be store in Android phone like owners face image If the face images are not matched then a MMS (Multimedia Messaging Service), SMS(Short Messaging Service) will be sent to owners mobile.MMS contains the captured face image nothing but thief image.SMS contains the latitude and longitude information of car.SMS will be sent from car periodically to owners mobile. Once the owner is sends secret code through SMS the car will stop immediately and the SMS sending from the car to owner’s mobile will be throttle down. The integer values are used for secret code. Fig.1. Block diagram of car security system All steps are controlled by the microcontroller in control system, including capturing images, face recognition, getting GPS information, sending MMS, SMS, stopping the car. II. Face Recognition Face recognition algorithms are used in a wide range of applications viz., security control, crime investigation, and entrance control in buildings, access control at automatic teller machines, passport verification, identifying the faces in a given databases.
  • 2. Car Theft Identification, Tracking And Control System www.iosrjournals.org 32 | Page The Principal Component Analysis (PCA) approach is also known as Eigen faces. PCA is a useful statistical technique that has found application in fields such as face recognition and image compression, and is a common technique for finding patterns in data of high dimension. The basic goal is to implement a simple face recognition system, based on well-studied and well-understood methods. One can choose to go into depth of one and only one of those methods. The method to be implemented is PCA(Principle Component Analysis). It is one of the most successful techniques of face recognition and easy to understand and describe using mathematics. This method involves the Eigen faces. In PCA the first step is to produce a feature detector (dimension reduction).Principal Components Analysis (PCA) was chosen because it is the most efficient technique, of dimension reduction, in terms of data compression. This allows the high dimension data, the images, to be represented by lower dimension data and so hopefully reducing the complexity of grouping the images 2.1 Methodology 2.1.1 Data Acquisition A database of different image sets of faces was constructed. It’s only got 2 dimensions, and the reason why one can have chosen this is so that one can provide plots of the data to show what the PCA analysis is doing at each step. 2.2 Subtract the mean image data For PCA to work properly, you have to subtract the mean from each of the data dimensions. The mean subtracted is the average across each dimension. So, all the x values have x’ (the mean of the x values of all the data points) subtracted, and all the y values have y’ subtracted from them. This produces a data set whose mean is zero. 2.3 Find the covariance matrix Covariance is always measured between 2 dimensions. The data is 2 dimensional the covariance matrix will be 2 * 2 as shown : Fig.2: A plot of the normalized data (mean Subtracted) with the Eigen vectors of the covariance matrix. 2.2.2 Face Recognition Process in Eigen faces Approach. Step 1. Build a face database that consists of the face images of car owner and relatives. Step 2. Choose a training set that includes a number of images (M) for each person with some variation in pose and different faces. Step 3. Calculate the M x M matrix L, find its Eigen vectors and Eigen values, and choose the M' Eigen vectors with the highest associated Eigen values.. Step 4. Combine the normalized training set of images to produce M' Eigen faces. Step 5. Store these Eigen faces for later use. Step 6. For each member in the face database, compute and store a feature vector. Step 7. Choose a threshold value e that defines the maximum allowable distance from any face class. Optionally choose a threshold f that defines the maximum allowable distance from face space. Step 8. For each new face image i.e. images captured by tiny digital camera in car to be identified, calculate its feature vector and compare it with the stored feature vectors of the face library members. Step 9. If the comparison satisfies the threshold for at least one member, then classify this face image as "known", otherwise a miss has occurred and classify it as "unknown" and add this member to the face library with its feature vector.
  • 3. Car Theft Identification, Tracking And Control System www.iosrjournals.org 33 | Page Fig.3. Face recognition based on PCA III. Gps Module GPS(Global Positioning System) technique has been widely used in military equipments and civil devices. Jupiter TU30 GPS module is used to find out the location of car in time.GPS module has a RS-232 (Recommended Standard)cable, which can be used to communicate with many other devices like microcontroller etc in Control System.It is easy to get details like longitude,latitude,speed and other information of car. Based up on the above information received from TU30 GPS module the owner of the car can identify the precise location of car. IV. Conclusion And Future Work In this security implementation of car consist of Face Recognition,GPS module, Control System,MMS and SMS sending features,is to avoid car theft and protect the usage of unauthenticated users. Fig4-captured image of a person at the time of Face Recognition using tiny digital camera. Secured and safety environment system for automobile users and also key points for the investigators can easily find out the hijackers image. We can predict the theft by using this system in our day to day life, and using mobile phone car can stop. In future in addition to MMS,SMS like to add recorded audio telephonic call that means after sending MMS from car automatically a telephonic call will go to owners mobile with already recorded audio. In future it will get its applicability in almost all security systems including organizations and automobiles. V. Acknowledgment I express my earnest and deep sense of gratitude to Mrs.D.Sujatha, Head Of the Department, Computer Science and Engineering without her valuable suggestions and guidance, preparation of this Paper wouldn’t have been possible. It was a great pleasure and honor to work under her and i hope many more fruitful associations in the years to come. Her kindness and affection will remain with me forever. I also owe the gratitude due towards S.Siva Sankar Rao Lecturer, Coordinator for me. And I would like to thank my guide G.Varalakshmi and other faculty members of ATRI college, for their noteworthy suggestions and encouragement given to me in completing the paper.I would also like to thanks the members of PRC(Project Review Committee) for their help, through provoking discussions invigorating suggestions extended to me with immense care, zeal throughout the work.
  • 4. Car Theft Identification, Tracking And Control System www.iosrjournals.org 34 | Page References [1] Ahmet Bahtiyar Gul “Holistic Face recognition by Dimension reduction”, May 2002. [2] Dr.Ch.D.V.Subba Rao ,Srinivasulu Asadi,V.Saikrishna (2010) A Comparative study of Face Recognition with Principal Component Analysis and Cross-Correlation Technique. International Journal of Computer Applications Volume 10– No.8, November 2010 [3] Goldberg D.E, “Genetic algorithms in search, optimization,and machine learning” Addison-Wesley, 1989. [4] Gonzales, R and Woods R,”Digital Image Processing, 2nd Edition Prentice-Hall Englewoodcliffs, NJ, 2002. [5] Joseph A. O'Sullivan, Robert Pless, “Advances in Security Technologies: Imaging, Anomaly Detection, and Target and Biometric Recognition”, Microwave Symposium IEEE/MTT-S International Volume, Page(s):761 – 764, 2007. [6] PU Han-lai, LING Ming, “Performance Oriented Customization of On-Chip Memory Capacity” Journal of Applied Sciences, p. 364, 2005. [7] S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z. Mushtaq,“Autonomous Vehicle Monitoring & Tracking System,” SCONEST 2005, pp. 1 – 4,2005. [8] Zhang Yu, “Research on High Level Model and Performance Estimation” Southeast University PHD thesis, 2007. NITHIN KURUP U.G born on August 08th 1984.He is pursuing M.Tech (Computer Science and Engineering) specialization at Aurora’s Technological and Research Institute, Hyderabad, India Affiliated to JNTU-Hyderabad . His expertise includes Mobile Computing , Computer Networks.