Real Time Vehicle Theft Identity and Control System Based on ARM 9



Similar documents
ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM

Keywords: GPS, GSM, AVR Microcontroller, SMS.

HIGH SECURED VEHICLE WITH INTERIOR VENTILATION CONTROL AND PERIMETER MONITORING SYSTEM

Raghavendra Reddy D 1, G Kumara Swamy 2

Advanced Vehicle Tracking System on Google Earth Using GPS and GSM

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks

Vehicle and Object Tracking Based on GPS and GSM

GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Protected Cash Withdrawal in Atm Using Mobile Phone

Design of a GSM Cell Phone based Vehicle Monitoring & Theft Security System

An Intelligent Parking Guidance and Information System by using image processing technique

How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

International Journal of Software and Web Sciences (IJSWS) GPS and GSM Based Database Systems for User Access

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS

RFID, GPS & GSM Based Vehicle Tracing & Employee Security System

Vehicle Tracking System using GPRS

SMART COLLEGE BUS TRACKING MANAGEMENT SYSTEM AND ITS APPLICATION

Applying Web Based GPS/GPRS Ticketing and Tracking Mechanism to Reduce Traffic Violation in Developing Countries

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

ADVANCED VEHICLE TRACKING SYSTEM USING ARM7

DESIGN OF SMS ENABLED CAR SECURITY SYSTEM

Car Authentication and Accident Intimation System Using GPS and GSM

Vehicle Tracking and Monitoring By ARM7

CMR Journal of Engineering and Technology Vol.1 Issue.1 January 2016

Android based Secured Vehicle Key Finder System

Intelligent Database Monitoring System using ARM9 with QR Code

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

DESIGN OF SMART HOME SECURITY SURVEILLANCE SYSTEM USING GSM

SMART DRUNKEN DRIVER DETECTION AND SPEED MONITORING SYSTEM FOR VEHICLES

Real Time Vehicle Tracking System using GSM and GPS Technology- An Anti-theft Tracking System

Vehicle Security System Using Zigbee

Intelligent Home Automation and Security System

GPS and GSM/GPRS Based Futuristic Automobile Live Detection and Protection Technology

Bus Data Acquisition and Remote Monitoring System Using Gsm & Can

A Multipurpose Vehicle Tracking System Based on ARM CORTEX-M3 STM32, HMC5883L, MPU-6050, GSM and GPS

How To Track A Vehicle With A Smart Vehicle Tracking System

Automobile Speed Violation Detection System using RFID and GSM Technologies

Smart Queue Management System Using GSM Technology

E-TRACKING SYSETEM FOR MUNICIPAL SOLID WASTE MANAGEMENT USING RFID TECHNOLOGY

GPS based Automated Public Transport Fare Collection Systems Based on Distance Travelled by Passenger Using Smart Card

How To Build A Gps Vehicle Tracking System On Android App.Com

REAL TIME VEHICLE CEASING AND TRACKING USING GSM

Accident Notification System by using Two Modems GSM and GPS

WIRELESS BLACK BOX USING MEMS ACCELEROMETER AND GPS TRACKING FOR ACCIDENTAL MONITORING OF VEHICLES

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES

EMBEDDED GSM MONITOR AND CONTROL USING ANDROID APPLICATION

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

Collided Vehicle Position Detection using GPS & Reporting System through GSM

Overview. 1. GPS data tracking via GSM SMS / GPRS. 2. GPS data logging in internal memory. 3. Alarm alert via GSM SMS / Dialing / GPRS

Keywords: rainfall detection, rain sensor, buzzer and alarm system.

DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE

DRUNKEN DRIVE PROTECTION SYSTEM

Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller

Design and Development of SMS Based Wireless Home Appliance Control and Security System

Intelligent boundary alert system using GPS

A secure face tracking system

RFID Based Real Time Password Authentication System for ATM

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING CAN AND ZIGBEE PROTOCOL

Gilsson AlwaysFind Web Base Fleet Management AVL & Personal GPS Trackers

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle

SIM300 GSM Module Controller For Smart Home

Development of an Ignition Interlock Device to Prevent Illegal Driving of a Drunk Driver

Use of modern telephone network for time transfer: An innovation

Low Cost SMS based Vehicle Tracking System using Android

Original Research Articles

RealTime Implementation of RTOS based Vehicle Tracking System

SHORT COMMUNICATION Vehicle Tracking and Theft Control Using GSM and GPS

International Journal of Computer Engineering Science (IJCES)

Child Tracking System on Mobile Terminal

Remote Vehicle Tracking & Driver Health Monitoring System Using GSM Modem & Google Maps

Vehicle Tracking System,

Review on Accident Alert and Vehicle Tracking System

International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3, Issue 6, June 2014

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

DESIGN AND IMPLEMENTATION OF ONLINE PATIENT MONITORING SYSTEM

SECURITY SYSTEM WITH FACE RECOGNITION, SMS ALERT AND EMBEDDED NETWORK VIDEO MONITORING TERMINAL

Sensor Based Automated Accident Tracking System

A Survey on Intelligent Home Security System Using GSM

INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) BUS TRACKING AND TICKETING SYSTEM

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

International Journal of Science Engineering and Advance Technology, IJSEAT, Vol 2, Issue 11

Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations

Home Security System Using Gsm Modem

Plc Based Monitoring and Controlling System Using Wi-Fi Device

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

ACCIDENT INFORMATION SYSTEM USING ARM PROCESSOR, GPS AND GSM TECHNOLOGY

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

Advanced Vehicle Tracking System Using ARM7

THE INTERNATIONAL JOURNAL OF SCIENCE & TECHNOLEDGE

Automated Alarm Based Railway Gate Crossing Based on GPS and GSM

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Transcription:

Real Time Vehicle Theft Identity and Control System Based on ARM 9 D.Narendar Singh Associate Professor, M.tech,Ph.d Department of Electronics and Communication Engineering Anurag group of Institutions, Hyderabad, A.P, India K.Tejaswi (M.Tech) Department of Electronics and Communication Engineering Anurag group of Institutions, Hyderabad, A.P, India Abstract - Due to the insecure environment the ratio of vehicle theft increases rapidly. Because of this is manufacturers of luxury automobiles has the responsibilities for taking steps to ensure the authorization for the owners and also in built the anti theft system to prevent the vehicle from theft. The proposed security system for smart cars used to prevent them from loss or theft using Advanced RISC Machine (ARM) processor. It performs the real time user authentication (driver, who starts the car engine) using face recognition, using the Principle Component Analysis (PCA) algorithm. According to the comparison result (authentic or not), ARM processor triggers certain actions. If the result is not authentic means ARM produces the signal to block the car access (i.e. Produce the interrupt signal to car engine to stop its action) and inform the car owner about the unauthorized access via Multimedia Message Services (MMS) with the help of GSM/GPRS modem. Also it can be extends to send the current location of the vehicle using the GPS modem as a Short Message Services (SMS). Keywords: Vehicle Security System, Face Recognition, GSM Module, Messaging Service, Advanced RISC Machine (ARM) Processor. I. INTRODUCTION Many people make the mistaken assumption that car theft only occurs in seedy areas of town, but car theft can occur anywhere from an urban area to a suburb. People need to be careful not to entice thieves by making common mistakes. Theft is one of the most common and oldest criminal behaviours. Where the ownership of a physical possession can be altered without the rightful owner's consent, theft prevention has been introduced to assert the ownership whenever the rightful owner is physically absent. An anti-theft system is any device or method used to prevent or deter the unauthorized appropriation of items considered valuable.. The rest of the paper is organized as follows. Proposed system and flowchart are explained in section II. Experimental results are presented in section III and Concluding remarks are given in section V. II. PROPOSED SYATEM 2.1. Overview of the project In our project, we propose an extendable emergency response system for smart car to prevent them from loss or theft using Advanced RISC Machine (ARM) processor (RISC means Reduced Instruction Set Computing). In this method, the Face Detection Subsystem (FDS) aims at detect somebody's face (who try to access the car).by using PCA algorithm we can get the common eigen values of the person and it compares the image by finding the nearest value in some mathematical form which as like a function. If the person matches vehicle starts or owner will get MMS and GPS values of the vehicle location as SMS. Vol. 2 Issue 1 January 2013 240 ISSN: 2278-621X

Fig. 1 Block diagram of proposed method 2.2. Face Detection System (FDS) Face recognition is a non-intrusive method, and facial attributes are probably the most common biometric features used by humans to recognize one another. The applications of facial recognition range from a static, controlled authentication to a dynamic, uncontrolled face identification in a cluttered background. While the authentication performance of the face recognition systems that are commercially available is reasonable, they impose a number of restrictions on how the facial images are obtained, often requiring a fixed and simple background with controlled illumination. These system also have difficulty in matching face images captured from two different views, under different illumination conditions, and at different times. 'th' is the threshold value depending on the real time environment (varies from 300-400). lt is questionable whether the face itself, without any contextual information, is a sufficient basis for recognizing a person from a large number of identities with an extremely high level of confidence. 2.3. Principle Component Analysis (PCA) The purpose of PCA is to reduce the large dimensionality of the data space (observed variables) to the smaller intrinsic dimensionality of feature space (independent variables), which are needed to describe the data economically. The main idea of using PCA for face recognition is to express the large 10 vector of pixels constructed from 15 facial image into the compact principal components of the feature space. This can be called Eigen face Projection. 2.4. Embedded Control System Vol. 2 Issue 1 January 2013 241 ISSN: 2278-621X

The ARM is a 32-bit Reduced Instruction Set Computer (RISC) Instruction Set Architecture (ISA) developed by ARM Holdings. It was known as the Advanced RISC Machine, and before that as the Acorn RISC Machine. The relative simplicity of ARM processors made them suitable for low power applications. This has made them dominant in the mobile and embedded electronics market as relatively low cost and small microprocessors and microcontrollers 2.5. MINI2440 ARM9 The ARM Mini2440 is a single board computer based on a Samsung S3C2440 ARM9 microprocessor. The board measures 10 cm x 10 cm, ideal for learning about ARM systems or integrating into numerous products. 2.6.GPRS/GSM Module A GSM module is a wireless modem that works with a GSM wireless network. Mainly used for the Short Message Service (SMS) in this project. A wireless modem behaves like a dial-up modem. The receiver in the GSM module is mentioned as ignition unit. A GSM modem can be an external device or a PC Card (specially used for laptop systems). Typically, an external GSM modem is connected through a serial cable or a USB cable. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to operate. 2.7. GPS Module GPS, which stands for Global Positioning System, is a radio navigation system that allows land, sea, and airborne users to determine their exact location, velocity, and time 24 hours a day, in all weather conditions, anywhere in the world. The capabilities of today s system render other well-known navigation and positioning technologies namely the magnetic compass, the sextant, the chronometer, and radio-based devices impractical and obsolete. GPS is used to support a broad range of military, commercial, and consumer applications. 2.8. Motor In any electric motor, operation is based on simple electromagnetism. A current-carrying conductor generates a magnetic field; when this is then placed in an external magnetic field, it will experience a force proportional to the current in the conductor, and to the strength of the external magnetic field. As you are well aware of from playing with magnets as a kid, opposite (North and South) polarities attract, while like polarities (North and North, South and South) repel. The internal configuration of a DC motor is designed to harness the magnetic interaction between a current-carrying conductor and an external magnetic field to generate rotational motion. Vol. 2 Issue 1 January 2013 242 ISSN: 2278-621X

I. Flow chart Start Add the data base images Do PCA to retrieve common eigen Recognize face from camera Compare the face by finding confidence No If matched? Yes Buzzer intilization Give signal to engine to start Send MMS to owners mobile Send GPS values to owners mobile Stop 2.9. Algorithm The working of the project can be explained in the following steps: 1. Initially switch On the power supply for boards ARM9, GPRS and GPS. 2. Capture the image from the camera. 3. Then save the image. Vol. 2 Issue 1 January 2013 243 ISSN: 2278-621X

4. Like this capture and save the image for 15 times. 5. From 15 images retrieve the common eigen values. 6. Store generalized eigen values in XML file. 7. Now click on the recognize button. 8. Then it compares the eigen values of the face. 9. If the image matched, start the motor. 10. If not matched buzzer initialized and 11. Send MMS of the face. 12. Send GPS values as SMS. III.EXPERIMENTAL RESULTS In this project, the real time face recognition is performed by using the PCA method with the help of web camera. Fig. 2 Gallery or database images Fig 2 shows the screen short after the collection of the gallery (owner) images. Then any person getting in to the carry it will compares if matched motor will starts i.e it will signal to the car to start otherwise the unauthorized person image will send as MMS to the owners mobile which shows the below figure 3. IV.CONCLUSION This paper has been successfully designed and tested. When compared with the existing system the advantage of this paper is that we can prevent the vehicle theft by using face recognition. In the present method the camera captures owner s image only. If the owner s relatives or friends want to start the vehicle it will not start. To overcome this one, we can extend this project by storing multiple faces into the memory. If any person wants to start the vehicle, the camera compares the person s image with the all stored images. If the result is matched the motor will start otherwise, the unknown person s image will go to the owner s mobile. In the Vol. 2 Issue 1 January 2013 244 ISSN: 2278-621X

current project if the results are unmatched, the unknown person s image will goes to owners mobile only. In future we can extend this by sending the information to police control room for taking immediate action. REFERENCES [1] AnandRaghunathan, NajwaAaraj, Niraj K..Iha, and Srivaths Ravi, "Hybrid Architectures for Efficient and Secure Face Authentication in Embedded Systems", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. IS, Mar. 2007, pp 296-308. [2] Chee-Ming Ting, Lih-Heng Chan, and ShHussainSalleh, "Face Biometrics Based On Principal Component Analysis and Linear Discriminant Analysis", Journal of Computer Science, 20 I 0, pp. 693-699. [3] Davis, B. DeLong, "Combined Remote Key Control AndImmobilization System For Vehicle Security", IEEE Power Electronics in Transportation, Oct. 1 996, pp. 125-13 2. [4] Fabio Roli, and Gian Luca Marcialis, "Fusion of Appearance-Based Face Recognition Algorithms", Pattern Analysis Application, 2004, pp. 151-163. [5] Guiming, and Zhixiong Liu, "A Vehicle Antitheft and Ala= System Based on Computer Vision", IEEE on Electrical Systems, 2005, pp. 326-330. [6] lie Yang, William Kunz, and Xilin Chen, "A PDA-Based Face Recognition System", Proceeding of Applications of Computer Vision in IEEE Workshop, 2002, pp. 1-5. [7] McCartney, "New Vehicle Security Assessment - A Practical Insurance Approach", European Convention on Security and Detection, May 1995, pp 239-243. Vol. 2 Issue 1 January 2013 245 ISSN: 2278-621X