In recent years, vehicle thefts are most important crux in the world. At the present time, the available anti theft vehicular systems are much more expensive. Many people are installed the vehicle theft control system in their vehicle for avoiding the theft. Here, the main goal is to reduce the vehicle theft with the developing of simple and low cost control scheme. The main components of this scheme are microcontroller, one hidden camera, a GPS and one mobile. The mobile makes the communication between the vehicle owner and the control module placed in the vehicle. The MMS is the one of the most and popular application in the mobile. Everyone has to be used that application easily. In this scheme the MMS helps to identify the thieves’ image for further processing. Nowadays the thieves are theft the vehicle very easily even it is secured. But this scheme, act as a critical threat for the vehicle thieves. By this scheme, the vehicles are easily located with higher accuracy. The control unit is based on the MMS technology, which is very developed now. The exact location of the vehicle information is gathered through the GPS module. This control scheme can be developed with low cost and it is accomodable to the practical implementation.
II.PROPOSED SYSTEM
In the image comparison unit the photo of the vehicle owner is stored as data base image. If an unauthorized person will try to theft the vehicle, the camera will capture the photo of the theft person. The photo of the unauthorized person and database image will be compared with the help of the face detection system. If the image does not match means the photo of the unauthorized person is sent to the vehicle owner through MMS [7]. Then the vehicle owner will able to con...
... middle of paper ...
...a
[3] Jie Chen, Shiguang Shan, Guoying Zhao ‘a robust descriptor based on webers law’ 2008 ieee
[4] Manjunath TK, Maheshwari N ‘Locking and Unlocking of Theft Vehicles Using Can’ ICGHPC 2013 march, India
[5] ARM data sheet available at‘http://www.keil.com/dd/docs/datashts/philips/lpc2141_42_44_46_48.pdf’
[6] VinothkumarSadagoban, Albert Joe Francis ‘Anti Theft Control System Design Using Embedded System’ IEEE 2011, Chennai.
[7] Multimediamessaging service available at ‘http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.4537&rep=rep1&type=pdf
[8]GPS documents available at http://en.wikipedia.org/wiki/GPS_navigation_device
[9]Sivaraman.S, Trivedi M.M, Jun 2013, ‘Integrated Lane and Vehicle Detection, Localization, and Tracking: A Synergistic Approach’, IEEE Transaction paper for Intelligent Transport System, Vol 14:issue 2, pp906 – 917
On 5 October 2009, computer equipment from a network data closet was stolen from BCBST. The items stolen were 57 unencrypted hard drives which contained over 300,000 video recording and over one million audio recordings. According to Whitman & Mattord (2010), confidentiality, integrity, and availability makes up the C.I.A triangle which is the basis of Committee on National Security model for information security, an industrial standard, (Whitman & Mattord, 2010). Confidentiality can be a synonym for encryption but also means only the people with the correct permission can access the information. One of the major security issue is the hard drives were not encrypted. The hard drives should be encrypted to prevent people from reading the information the computer. Software can be purchased which will encrypt files on hard drive with such as Folder Lock, SensiGuard, Secure IT, and more. There are open source encrypting software which are free for use which could have been used. If the hard drives were not needed, the data should hav...
Imagine that your car could detect hazardous roads before you could sense it? A feature that provides this type of protective driving exists within European cars. This valuable safety feature that is offered in European cars i...
In many countries the used of surveillance videos have been growing intensively. As a consequence, a large number of crimes were successfully recorded by the surveillance videos. Therefore, the question of identification of the person on the recording media or digital images is sent to the forensic experts more frequently. However, this can be a formidable task especially when the recordings are in bad quality and enhanced footage have failed to reveal the face (identity) of the suspect. Most of this problem is caused by the resolution of the system, uncalibrated equipment and the lack of efficient and practical method to identify the criminal suspect through surveillance images.
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
Hirayama, T., Iwai, Y., & Yachida, M. (2007, May). Integration of facial position estimation and person identification for face authentication [Electronic Version]. Systems & Computers in Japan, 38(5), 43-58.
People around the world are constantly moving from place to place. Whether that place is work, a restaurant, or home, people require a means of transportation in order to arrive at a desired destination safely and efficiently. One of the most used means of transportation today are cars. Cars play an important role in the world’s economy by transporting goods and people. Automobiles have come a long way since Ford’s first Model T, and the auto industry plans to further enhance the technology and capabilities of the cars that drive on our roads. New technological advancements like rear-view camera, self parking, and auto braking have greatly improved the overall safety of cars today. However, one of the most talked about ideas are autonomous
Modern internet technology is introduced into new vehicles as a safety feature. One recent idea is having connectivity between vehicles. Ankeeta Patel of Parul Institute of Engineering and Technology presents the
These frauds take place because many people leave their vehicles unattended at shops or can’t see what is going on inside the garage. Many times a p...
This approach includes two processes, training and classification (Chelali, Djeradi & Dejradi, 2009). In the training process, a subspace will be established by using the training samples, and then the training faces will be projected onto the same subspace. In the classification process, the input face image will be measured by Euclidean Distance to the subspace, and a decision will be made, either accept or reject.
The Ultimate Vehicle Security System. (2001). Retrieved September 18, 2001 from the World Wide Wed: http://www.powerlock.com/plfront.htm
Biometrics is a preset method to recognize a person based on a physiological or behavioral attribute. The present features are face recognition, fingerprints, handwriting, hand geometry, iris, vein, voice and retinal scan. In the early years of the 21st century, we find ourselves persistently moving further away from the stipulation of physical human interface playing a major part of basic everyday tasks. Striding ever closer to an programmed society, we interact more habitually with mechanical agents, unsigned users and the electronic information sources of the World Wide Web, than with our human counterpart. It is therefore possibly sardonic that identity has become such an important issue in the 21st century. Face recognition has been related as the divine Grail of biometric recognition systems, due to a number of noteworthy advantages over other methods of identification.
So we are going to design a system which aims to improve parking facilities by the introduction of a smart car parking system. The system will automatically assign a vacant space to the patrons for parking their vehicles. The patron will be guided to the specified location by referring to variable message sign and the map and the location printed on the parking ticket, in which the whole process is monitored by a central computer to store and update the occupancy status of available parking space vacancies in the database.
Throughout the world, vehicles have been increasing and developed to satisfy the needs of humans for travelling distances from one place to another. However, when the world is overpopulated and vehicles amount is growing as well, the requirements of more parking have appeared remarkably; therefore, engineers have started to create new methods to park a large amount of vehicles. For instance, automated car and bike parking systems are some of the significant innovations that have made parking system much more flexible. This report will describe the process of parking the cars, and bikes in automated parking systems and then it will examine the advantages and the disadvantages of the systems usage.
“Each light has a different preset wavelength designed to detect hair, fibers, and body fluids at crime scenes, these lights allow a crime scene to be processed faster and more thoroughly than ever before.” This technology is speedy and can help locate the whereabouts of criminals. The use of in-car camera systems has become very popular, especially by law enforcement. These cameras are used to record traffic stops and road violations of civilians. “From the time the first in-car cameras were installed to document roadside impaired-driving sobriety tests, the cameras have captured both intended and unintended video footage that has established their value. Most video recordings have resulted in convictions; many provide an expedited means to resolve citizen complaints, exonerate officers from accusations, and serve as police training videos.” Photo enforcement systems helps to maintain road safety by “automatically generating red light violations and/or speeding summons and as a result to greatly improve safety for the motoring public.” (Schultz,
(c). Hanks. P. 2000. The Basics of Loop Vehicle Detection. [ONLINE] Available at: http://www.marshproducts.com/pdf/Inductive%20Loop%20Write%20up.pdf.html. [Accessed 01 December 13].