Smart Security System for Theft Protection Using Face Recognition
Keywords:
Vehicle security, Face detection, Face recognition, Multimedia Messaging Service (MMS), Authorization.Abstract
The number of car robbery attempts at the local and international scale is rising rapidly in this modern era. By inventing robbery techniques, the owners are afraid that their cars will be robbed from their ordinary parking lot or from outside. This makes vehicle protection against robbery important as a result of insecurity. The computer vision based real-time vehicle safety system solves this problem. The proposed car safety system carries through real time user authentication based on image processing using face detection and recognition techniques and a microprocessor-based control system attached to the car. The infrarot sensor attached to the driver's vehicles seat activates the hidden camera, which is fixed inside the vehicle, as the person enters the parked vehicle overcoming the existing security features. The person's face is detected using Viola Jones algorithm once the image is obtained from the activated camera. The extracted face is recognized using the improved Linéar Discriminant Analysis (LDA) algorithm that distinguishes many features rather than looking for an exact pattern based on the Euclidean distance. Authorization requires that the threshold value is established and compared to the Euclidean distance over which the person is not authenticated. The face is sent to the mobile of the owner as an MMS via the operating GSM modem, which is classified as unknown. The owner shall be controlled with the relay in accordance with the owner’s command when the information is received. The way to authenticate the person would be efficient and efficient in terms of vehicle safety.
References
- Divya Malik, Shaloo Bansal,”Face Recognition Based on Principal Component Analysis and Linear Discriminant Analysis”, International Journal of Research in Electronics and Communication Technology (IJRECT 2016)
- A. Abuzneid and A. Mahmood, "Enhanced Human Face Recognition Using LBPH Descriptor, Multi-KNN, and Back-Propagation Neural Network," IEEE Access, vol. 6, pp. 20641-20651, 2018.
- "An Intuitive Explanation Of Convolutional Neural Networks". The data science blog, 2017. Web. 10 Feb. 2017. Available: https://ujjwalkarn.me/2016/08/11/intuitive-explanation-convnets
- Grega, Michael, Andrzej Matiolanski, Piotr Guzik, and Mikolaj Leszczuk. "Automated Detection of Firearms and Knives in a CCTV Image." Sensors 16.1 (2016): 47
- Erhan, Dumitru, Christian Szegedy, Alexander Toshev, and Dragomir Anguelov. "Scalable Object Detection Using Deep Neural Networks." 2014 IEEE Conference on Computer Vision and Pattern Recognition (2014).
- S. Satari, N. A. A. Rahman, and Z. M. Z. Abidin, "Face recognition for security efficiency in managing and monitoring visitors of an organization," in 2014 International Symposium on Biometrics and Security Technologies (ISBAST), 2014, pp. 95-101.
- Shao, J. Cai, and Z. Wang, "Smart Monitoring Cameras Driven Intelligent Processing to Big Surveillance Video Data," IEEE Transactions on Big Data, vol. 4, pp. 105-116, 2018.
- Jamil, S. Lqbal, and N. Iqbal, "Face recognition using neural networks," in Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century., 2001, pp. 277-281.
- Bong, S. Choi, C. Kim, D. Han, and H. Yoo, "A Low-Power Convolutional Neural Network Face Recognition Processor and a CIS Integrated With Always-on Face Detector," IEEE Journal of Solid-State Circuits, vol. 53, pp. 115-123, 2018.
- Kim, H. Kim, S. Kim, H. Kim, and S. Ko, "Illumination normalisation using convolutional neural network with application to face recognition," Electronics Letters, vol. 53, pp. 399-401, 2017.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.