0% found this document useful (0 votes)
21 views33 pages

Project Report Final

The project report details the development of a Raspberry Pi Vehicle Anti-Theft Face Recognition System aimed at enhancing vehicle security through facial recognition technology. The system features real-time monitoring, scalability, and compatibility with smart devices, allowing for user authentication and immediate alerts against unauthorized access. The report also outlines the project's objectives, methodology, and the significance of digital image processing in improving security measures within the automotive industry.

Uploaded by

Subhasish sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views33 pages

Project Report Final

The project report details the development of a Raspberry Pi Vehicle Anti-Theft Face Recognition System aimed at enhancing vehicle security through facial recognition technology. The system features real-time monitoring, scalability, and compatibility with smart devices, allowing for user authentication and immediate alerts against unauthorized access. The report also outlines the project's objectives, methodology, and the significance of digital image processing in improving security measures within the automotive industry.

Uploaded by

Subhasish sahoo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

A project report on

Raspberry Pi Vehicle Anti-Theft Face Recognition System


submitted in partial fulfillment of the requirements for the degree of

B.Tech
In
Electronics and Computer Science Engineering
By

NAME: Siwen Mohapatra Roll No.: 2130138


NAME: Subhasish Sahoo Roll No.: 2130150
NAME: Suyash Parganiha Roll No.: 2130153
NAME: Sai Sritam Sarangi Roll No.: 2130160

under the guidance of


Dr. Mamata Panigrahy
Prof. S. Ramavath

School of Electronics Engineering


KALINGA INSTITUTE OF INDUSTRIAL TECHNOLOGY
(Deemed to be University)
BHUBANESWAR
NOVEMBER 2024
CERTIFICATE

This is to certify that the project report entitled


“Raspberry Pi Vehicle Anti-Theft Face Recognition System”
submitted by

NAME: Siwen Mohapatra Roll No.: 2130138


NAME: Subhasish Sahoo Roll No.: 2130150
NAME: Suyash Parganiha Roll No.: 2130153
NAME: Sai Sritam Sarangi Roll No.: 2130160

in partial fulfillment of the requirements for the award of the Degree of Bachelor of Technology in
Electronics and Computer Science Engineering is a bonafide record of the work carried out under my (our)
guidance and supervision at School of Electronics Engineering, KIIT (Deemed to be University).

_______________________
Signature of Supervisor
Dr. Mamata Panigrahy
School of Electronics Engineering
KIIT (Deemed to be University)

________________________
_______________________
Signature of Co-Supervisor
Prof. S. Ramavath
School of Electronics Engineering
KIIT (Deemed to be University)
ACKNOWLEDGEMENTS

We, the members of Project “Raspberry Pi Vehicle Anti-Theft Face Recognition System”, would like to
extend our deepest gratitude to everyone who contributed to the success of this project. This journey has been
one of collaboration, learning, and mutual support, culminating in a project that we are proud to present.
First and foremost, we express our sincere thanks to our project supervisor, Prof. Mamata Panigrahy, and
co-supervisor, Prof. S. Ramavath, whose guidance, expertise, and patience were instrumental in steering this
project towards its completion. Their insights and feedback were invaluable, and their encouragement
motivated us to excel.
We are also very thankful to Dr. (Mrs.) Sarita Nanda, Associate Dean and Associate Professor, Dr. (Mrs.)
Suprava Patnaik , Dean and Professor, School of Electronics Engineering, and Project Coordinators, for their
support and suggestions during entire course of the project work in the 6th semester of our undergraduate
course.
Lastly, we extend our gratitude to each other, the members of Project “Raspberry Pi Vehicle Anti-Theft
Face Recognition System”. This project was a collaborative effort that required dedication, compromise,and
teamwork. We have grown individually and collectively through this experience, gaining not just knowledge
but also friendships that we treasure.
This project report is not only a reflection of our hard work but also a testament to the support and guidance
we received from all those mentioned above. Thank you for making this journey memorable and our project
a success.

Roll Number Name Signature


2130138 Siwen Mohapatra

2130150 Subhasish Sahoo

2130153 Suyash Parganiha

2130160 Sai Sritam Sarangi

Date: 06/11/2024
ABSTRACT

This report presents an innovative anti-theft vehicle security system that integrates facial recognition
technology to bolster vehicle security, particularly in parking environments. At the core of the system lies a
high-performance microprocessor that ensures swift data processing, complemented by advanced algorithms
for precise face detection and recognition. Real-time monitoring features enable immediate alerts in response
to suspicious activities or unauthorized access attempts, enhancing the system's responsiveness.

Scalability is a key feature of the system, allowing for the seamless integration of additional security
components and devices as required, while also offering customizable security protocols tailored to specific
needs. The system's adaptability extends to its compatibility with smart devices, enabling users to remotely
oversee and manage their vehicle's security through mobile applications and connected platforms.

The facial recognition algorithm serves as a cornerstone of the system, comparing facial attributes from
captured images with stored data to authenticate authorized individuals and thwart unauthorized usage.
Although the initial image processing time is approximately 6 seconds, the document proposes optimization
strategies to enhance system efficiency without compromising accuracy.

In summary, the anti-theft vehicle security system leveraging facial recognition technology represents a
cutting-edge solution to fortify car security and prevent illicit access. By harnessing state-of-the-art technology
and sophisticated algorithms, the system provides a dependable and effective approach to safeguarding
vehicles and deterring theft. Its scalability, customization options, and integration with smart devices
underscore its versatility and potential to revolutionize vehicle security measures in diverse settings.
TABLE OF CONTENTS

Acknowledgment

Abstract

Table of Contents

CHAPTER 1: INTRODUCTION

CHAPTER 2: OBJECTIVES

CHAPTER 3: LITERATURE SURVEY

CHAPTER 4: INDUSTRY-BASED APPLICATION

CHAPTER 5: PROJECT METHODOLOGY


 Hardware specification
 Software specification

CHAPTER 6: PROPOSED SYSTEM


 Working principle
 Software Design
 Results

CHAPTER 7: COST ANALYSIS

CHAPTER 8: CONCLUSIONS

CHAPTER 9: REFERENCES
1. INTRODUCTION

Facial recognition technology has been increasingly integrated into vehicle security systems, aiming to address
the vulnerabilities of traditional key-based security systems. Continental, a leading technology company, has
introduced an innovative two-stage access control system based on facial recognition called the "Face
Authentication Display." This system combines special camera systems mounted externally on the vehicle's
B-pillar and invisibly behind the driver display console for biometric user recognition. The core principle of
the Face Authentication Display is simple yet effective. After enrollment, the system "remembers" the driver's
face, and each time the driver enters the vehicle, the system "recognizes" them and grants access to predefined
functionalities like starting the car. This technology not only enhances the security of the vehicle but also
offers a seamless and user-friendly access experience. Car owners can set up permissions or restrictions for
other users, such as family members. For example, parents can establish limits on their children learning to
drive, such as time or speed restrictions, or even deny access without an adult present. Furthermore, facial
recognition technology can detect unauthorized access attempts, triggering notifications or preventing the car
from starting. Continental's facial recognition system is robust and versatile, enabling it to recognize drivers
in various situations. Changes in appearance, lighting conditions, and angles are all accounted for, ensuring
high recognition accuracy. Advanced facial authentication technology is used to prevent unauthorized access
and ensure the highest security standards. In addition to facial recognition, Continental has integrated the
technology into the vehicle's B-pillar for advanced theft prevention. A special camera embedded in the B-
pillar checks for a visual match with a known user and allows for skin recognition, adding an additional layer
of security against theft. This double authentication in the exterior and interior protects the vehicle from
unauthorized access even more effectively. In addition to facial recognition, Continental has integrated the
technology into the vehicle's B-pillar for advanced theft prevention. A special camera embedded in the B-
pillar checks for a visual match with a known user and allows for skin recognition, adding an additional layer
of security against theft. This double authentication in the exterior and interior protects the vehicle from
unauthorized access even more effectively. An additional display integrated into the B-pillar allows users to
interact with the vehicle, displaying information such as charging progress for electric cars. When not in use,
the display seamlessly integrates into the vehicle's exterior design, offering intuitive new interaction options
without compromising aesthetics. In summary, facial recognition technology in vehicle security systems offers
numerous benefits, including increased safety, convenience, and user-friendly access control. Continental's
Face Authentication Display and integration with the B-pillar for advanced theft prevention are prime
examples of how facial recognition can be used in the automotive industry to enhance security and user
experience.
2. OBJECTIVES

The objectives outlined in the report for the smart car security system using facial recognition technology
are twofold. Firstly, the primary objective is to create an advanced security system that identifies authorized
users of the vehicle through facial recognition technology. Secondly, the project aims to provide students
with basic knowledge of digital image processing by implementing this technology in a real-world
application. These objectives focus on enhancing security features for vehicles and educating students on
practical applications of digital image processing within the context of smart car security systems.

3. LITERATURE SURVEY

Year Title Author Problem statement

Real-Time Face Priyanka Wagh, This paper proposes a real-time face recognition
Recognition Jagruti Chaudhari system using Raspberry Pi and OpenCV. The
2015 System Using system uses Haar cascades for face detection and
Raspberry Pi Local Binary Pattern Histogram (LBPH) algorithm
for face recognition.The results showed that the
system can recognize faces in real time.

Design and A. S. Kavitha and This paper proposes a smart door security
Implementation P. Sathya. system using Raspberry Pi and face recognition.
of a Smart Door The system uses the Eigenface algorithm for face
2017 Security System recognition and a servo motor to control the door
using Raspberry lock. The results showed that the system can
Pi accurately recognize faces and control the door
lock.

A Real-Time S. This paper proposes a real-time face


Face Shafaei, R. K. recognition system using Raspberry Pi and
2020 Recognition Shukla, and M. S. OpenCV. The system uses Haar cascades for face
System using Islam. detection and the LBPH algorithm for face
Raspberry Pi and recognition. The results showed that the system
OpenCV can recognize faces in real-time.
4. INDUSTRY-BASED APPLICATION

The industry-based applications of digital image processing within the context of the smart car security system.
Digital image processing is utilized to convert images into a digital format for various operations such as
enhancement, analysis, and information extraction. In the industry, this technology finds applications in fields
like medicine for analyzing medical images, as well as in software applications for editing. Specifically,
multinational technology companies use digital image processing for enhancing security features in their
devices. The report highlights the growing importance of digital image processing in different industries and
its relevance in improving security systems for computer-based vehicles.The industry-based applications
highlighted in the report for the smart car security system using facial recognition technology encompass
various sectors such as automotive, security, and technology. The implementation of facial recognition
technology in smart car security systems offers enhanced vehicle security features, allowing for seamless
access control and user authentication. Additionally, the integration of this technology in the automotive
industry can lead to advancements in driver monitoring systems, personalized vehicle settings, and improved
safety measures. Furthermore, the adoption of facial recognition technology in security applications can
enhance surveillance systems, access control mechanisms, and overall security protocols. Overall, the
industry-based applications of facial recognition technology in smart car security systems demonstrate its
potential to revolutionize security measures, enhance user experience, and drive innovation across various
sectors.

5. PROJECT METHODOLOGY

A. The project methodology in the report for the smart car security system involves the use of face
recognition technology to identify authorized users of the vehicle. When the user activates the vehicle,
the advanced system is automatically activated, providing options to start the vehicle, register new
users, or delete user data. Users are prompted to register their names and scan their faces for successful
recognition before being able to start the vehicle. In case of unauthorized access, the system scans the
individual's face and compares it with the registered user database. If a match is not found, an alarm is
triggered to alert nearby individuals of a potential theft attempt. This methodology focuses on
leveraging facial recognition technology to enhance security measures, streamline user authentication,
and prevent unauthorized access within the smart car security system.The project methodology
detailed in the report for the smart car security system using facial recognition technology involves the
systematic implementation of an advanced security system. This system leverages facial recognition
technology to identify authorized users of the vehicle. When the vehicle is activated, the advanced
security system is automatically activated as well, presenting users with three options: starting the
vehicle, registering new users, or deleting existing user data. Users are required to register their names
and scan their faces for successful recognition before being granted access to start the vehicle. In cases
where unauthorized individuals attempt to use the vehicle, the system scans their faces and compares
them against the database of registered users. If a match is not found, an alarm or buzzer is triggered
to alert nearby individuals of the unauthorized access attempt. This methodology focuses on enhancing
security measures, streamlining user authentication, and preventing unauthorized access within the
smart car security system using facial recognition technology.

B. Hardware specification:

 Camera: The HP Webcam W100, while primarily designed for video conferencing and general
computer usage, can also be adapted for certain security applications, including anti-theft vehicle
security. When considering its hardware specifications for such a purpose, several key factors should
be taken into account. Firstly, the resolution of the webcam is a crucial specification. The higher the
resolution, the clearer and more detailed the captured images or videos will be. For anti-theft
purposes, a webcam with a resolution of at least 720p or higher would be desirable to ensure clear
and identifiable footage of any potential theft incidents or unauthorized access to vehicles. Another
important specification is the frame rate of the webcam. A higher frame rate, such as 30 frames per
second (fps) or above, ensures smoother and more fluid video playback, which can be beneficial for
capturing fast-moving objects or individuals in security scenarios. The webcam's field of view (FOV)
is also a consideration. A wider FOV allows the webcam to capture a larger area, making it easier to
monitor multiple angles or locations within a vehicle or its surroundings. A FOV of around 90 degrees
or more would be suitable for anti-theft surveillance purposes. Low-light performance is a critical
aspect, especially for outdoor or nighttime surveillance. The webcam should have good low-light
sensitivity and possibly include features like infrared (IR) illumination or enhanced low-light settings
to capture clear images even in dimly lit environments. Durability and weather resistance may also
be important factors depending on where the webcam will be installed. For outdoor use or in vehicles
exposed to varying weather conditions, a webcam with a rugged design and weatherproof features
would be preferable to ensure longevity and reliable performance. Integration capabilities with
existing security systems or software are worth considering as well. The webcam should be
compatible with common video surveillance software or platforms used for anti-theft vehicle security,
allowing for seamless integration and management of captured footage and alerts. Overall, when
adapting the HP Webcam W100 for anti-theft vehicle security, focusing on specifications such as
resolution, frame rate, FOV, low-light performance, durability, weather resistance, and integration
capabilities will help ensure effective surveillance and monitoring capabilities to deter theft and
enhance vehicle security.
 Images from the camera: The related work section on "Images from the camera" in the report
discusses the role of image capture technology in the system prototype, specifically focusing on the
integration of USB cameras within vehicles. This technology enables the prototype to capture images,
which are essential for the facial recognition process in the security system. Image data is transmitted
through USB channels to the Face Detection and Recognition (FDS) module. Before transmission,
the embedded camera chip converts the data into JPEG format files, ensuring compatibility and
efficient handling. To facilitate quick detection and processing, small image resolutions are
maintained throughout the system. Each captured image has a resolution of 320x240 pixels, which
balances the need for sufficient detail for facial recognition while minimizing computational
requirements. This balance ensures a swift and accurate identification process without unnecessary
delays. Image capture technology plays a significant role in the facial recognition process within the
security system. High-quality image data is crucial for accurate identification and authentication,
allowing the system to effectively distinguish between authorized and unauthorized users. By
leveraging camera technology, the system can reliably recognize users and provide enhanced security
measures, bolstering the overall functionality and effectiveness of the anti-theft system. In addition
to facial recognition, image capture technology can also be instrumental in monitoring other aspects
of the vehicle's security. For example, image data can be used to detect potential tampering or
vandalism, providing an additional layer of protection. Moreover, image data can be stored for future
reference, enabling users and authorities to review incidents and gather evidence when necessary. In
summary, the related work section on "Images from the camera" in the report highlights the crucial
role of image capture technology in the anti-theft system prototype. By integrating USB cameras and
optimizing image resolutions, the system can efficiently and accurately recognize authorized users,
prevent unauthorized access, and enhance overall security measures. The technical insights provided
in this section underscore the importance of camera technology in enabling effective security
measures and enhancing the functionality of the anti-theft system.

 GPS Module: The related work section on the GPS module in the report highlights the significance
of integrating Global Positioning System (GPS) technology in vehicle security systems. By
incorporating GPS, the system can accurately track the location of the vehicle, which is crucial in
preventing theft and identifying the thief. Compared to traditional methods, GPS technology provides
a more efficient and cost-effective solution for location tracking. The section further explains how
the GPS module detects the vehicle's location, enabling real-time data transmission, which is essential
in theft control techniques. This feature ensures the safety of automobile users and provides them
with peace of mind. Additionally, the section discusses the seamless integration of the GPS module
with the overall security system. By working together with other security components, the GPS
module contributes to creating a secure and efficient environment for vehicle owners. In summary,
the related work emphasizes the importance of GPS technology in modern vehicle security systems.
With its enhanced theft detection and location tracking functionalities, GPS technology provides
vehicle owners with improved security measures, making it an essential component in vehicle
security systems.

 Bluetooth: The related work section on Bluetooth in the report explores the benefits of integrating
Bluetooth technology in vehicle security systems. By incorporating Bluetooth, the system can
establish wireless communication between the security system and the user's mobile device, enabling
remote control functionalities. The section explains how Bluetooth connectivity facilitates the
transmission of data, such as alerts and notifications, between the security system and the user's
mobile device. This feature allows for real-time communication, which is essential in ensuring the
safety of automobile users. Furthermore, the section highlights the convenience and accessibility
provided by Bluetooth technology in enhancing the user experience. With Bluetooth integration,
users can perform actions like sending SMS alerts, disabling the engine, and enabling remote control
features through mobile devices. Additionally, the section emphasizes the role of Bluetooth in
facilitating seamless communication between the security system and the user's mobile device. This
feature ensures efficient interaction with the security system, making it easier for users to monitor
and control their vehicles. In summary, the related work underscores the importance of Bluetooth
integration in modern vehicle security systems. With its enhanced control and monitoring
capabilities, Bluetooth technology provides users with improved interaction and communication with
the security system, making it a valuable component in vehicle security systems.

 Raspberry Pi: The related work section on Raspberry Pi in the report delves into the advantages of
using Raspberry Pi, a mini-computer, in the proposed smart car security system. By incorporating
Raspberry Pi, the system can enhance its functionality and control platform, providing users with
advanced security features. The section explains how Raspberry Pi is integrated with essential
components like the Face Detection Subsystem (FDS), GPS module, and Bluetooth to create a
comprehensive and extendable framework for vehicle security. This integration enables the system
to perform various tasks, such as capturing driver photos, comparing faces with a database, and
enabling remote car stopping through mobile commands. Furthermore, the section highlights
Raspberry Pi's versatility and compatibility with various operating systems, making it a popular
choice for educational projects and IoT applications. This feature allows for easy customization and
extension of the security system, providing users with a cost-effective and efficient solution for
implementing advanced security features. In summary, the related work underscores the significance
of Raspberry Pi in enhancing the capabilities of the smart car security system. With its advanced
functionality and compatibility with various components, Raspberry Pi provides users with a cost-
effective and efficient solution for implementing advanced security features, making it an essential
component in the proposed system.
 DC Motor: The DC Motor in the smart car security system plays a vital role in the system's design
and functionality. This component is responsible for automating physical movements within the
security system, such as activating locking mechanisms or controlling barriers, based on the
authentication results obtained through facial recognition. The voltage requirements of the DC Motor
specify the amount of electrical voltage needed to power and operate the motor efficiently within the
system. The power rating, on the other hand, indicates the motor's power output, which affects its
ability to perform tasks effectively. Furthermore, the speed capabilities of the DC Motor determine
how quickly it can initiate movements or responses within the security system, contributing to the
system's overall responsiveness. This feature is essential for ensuring that the system can react
promptly to potential security threats. Moreover, the torque output of the DC Motor is a critical
specification that defines the motor's rotational force or twisting power. This specification is crucial
for ensuring that the motor can exert sufficient force to actuate physical components of the security
system, such as locking mechanisms or barriers, with precision and reliability. By incorporating a
DC Motor with appropriate hardware specifications, the smart car security system can effectively
automate security processes, enhance user convenience, and strengthen the overall security measures
implemented in the vehicle. Overall, the DC Motor is an essential component in the smart car security
system, enabling the system to perform physical movements with precision and reliability.

 Buzzer: The Buzzer in the smart car security system is a vital component that serves as an audio
signaling device for various system events. The Buzzer is responsible for providing audible
notifications, such as alarms, alerts, and user input confirmations, to enhance user awareness and
system responsiveness. Its hardware specifications typically include details such as the operating
voltage, sound output level, frequency range, and design features. Moreover, the Buzzer is designed
to emit sound signals based on specific triggers within the security system, ensuring that users are
promptly notified of any system events. The hardware specifications of the Buzzer may also include
information about the type of buzzer (mechanical, electromechanical, or piezoelectric), mounting
options, and compatibility with the system's control mechanisms. In summary, the hardware
specification of the Buzzer in the smart car security system highlights its role as an audio signaling
device for alert notifications. The specifications detail aspects such as operating voltage, sound output
characteristics, and design features, emphasizing the Buzzer's importance in providing audible alerts
and feedback within the security system.

 Liquid Crystal Display: The Liquid Crystal Display (LCD) in the smart car security system is a
crucial component that serves as a visual interface for displaying information to users. The LCD
utilizes liquid crystals to present data, images, and system feedback, ensuring that users are informed
about the status of the security system. Its hardware specifications typically include details such as
screen size, resolution, color depth, refresh rate, viewing angles, and backlight technology.
Furthermore, the LCD plays a critical role in providing visual feedback and information to users,
enhancing the overall user experience and system responsiveness. The hardware specifications of the
LCD may also include information about touch functionality, interface compatibility, power
consumption, and durability for automotive applications. In summary, the hardware specification of
the LCD in the smart car security system highlights its role as a visual display component for
presenting information to users. The specifications detail aspects such as screen size, resolution, color
depth, and viewing angles, emphasizing the LCD's importance in conveying critical system data and
feedback effectively within the security system.

 Resistors: In an anti-theft vehicle security system, resistors play a critical role in managing the flow
of electrical current within the circuitry. These resistors are carefully chosen based on specific
hardware specifications to ensure optimal performance and reliability of the security system. One of
the primary hardware specifications is the resistance value of the resistors. This value determines how
much the resistor impedes the flow of current, allowing for precise control over electrical pathways
within the system. By strategically placing resistors with specific resistance values, the system can
regulate current flow, voltage levels, and signal processing, crucial for functionalities like
immobilizers and alarm systems. Another important specification is the power rating of the resistors.
This rating indicates the maximum power the resistor can handle without overheating or getting
damaged. In an anti-theft system, where electrical loads can vary significantly, using resistors with
appropriate power ratings is essential to ensure they can withstand the demands of the system without
compromising safety or functionality. Tolerance is also a critical consideration. Resistors have a
tolerance level that defines how closely their actual resistance value matches the specified value.
Tight tolerance levels are preferred for anti-theft systems to ensure accurate and reliable performance,
especially in detecting unauthorized access or tampering. The temperature coefficient of resistors is
another vital specification. This coefficient indicates how the resistance of the resistor changes with
fluctuations in temperature. Given the diverse temperature conditions in automotive environments,
using resistors with stable temperature coefficients ensures consistent resistance values across
different operating conditions, enhancing the system's overall reliability. Physical attributes such as
size, mounting options, and material composition also influence the choice of resistors. Compact
resistors that can be easily integrated into the vehicle's electronic architecture are preferred, along
with materials that offer resistance to temperature variations, vibrations, and moisture. These factors
contribute to the longevity and durability of the resistors in harsh automotive environments.
Furthermore, compatibility with other electronic components within the security system is crucial.
Resistors must work seamlessly with sensors, controllers, alarm systems, and communication
interfaces to avoid issues such as signal interference or voltage mismatches, which could compromise
the effectiveness of the security measures. Overall, by considering these hardware specifications and
selecting appropriate resistors, manufacturers can design anti-theft vehicle security systems that are
robust, reliable, and capable of providing enhanced protection against unauthorized access and theft.

 Capacitors: Capacitors are crucial components in anti-theft vehicle security systems, contributing to
their functionality and reliability. These capacitors are selected based on specific hardware
specifications to ensure they can perform their intended roles effectively. One of the key hardware
specifications is the capacitance value of the capacitors. This value determines how much electrical
charge the capacitor can store. In anti-theft systems, capacitors with precise capacitance values are
utilized to store energy efficiently for various functions such as powering electronic locks, alarms, or
immobilizers. Another critical specification is the voltage rating of the capacitors. This rating
indicates the maximum voltage that the capacitor can withstand without experiencing electrical
breakdown or damage. Given the voltage fluctuations that can occur in vehicle electrical systems,
capacitors with appropriate voltage ratings are essential to maintain system integrity and prevent
potential failures. Tolerance is also an important consideration for capacitors. It refers to how closely
the actual capacitance value of the capacitor matches its specified value. Capacitors with tight
tolerance levels are preferred in anti-theft systems to ensure consistent energy storage and reliable
performance over time. The choice of dielectric material used in capacitors is significant as well.
High-quality dielectric materials are selected to ensure stable capacitance values and reliable
operation, especially in demanding automotive environments with temperature variations and
vibrations. Physical attributes such as size, mounting options, and durability are also taken into
account. Capacitors used in anti-theft systems should be compact, easy to integrate into the vehicle's
electronic architecture, and capable of withstanding harsh environmental conditions. Additionally,
factors such as Equivalent Series Resistance (ESR) are considered. Low ESR capacitors are favored
as they can handle high-frequency currents more effectively, minimizing energy losses and improving
overall system efficiency. Finally, compatibility with other system components is essential.
Capacitors must work seamlessly with sensors, controllers, and communication interfaces within the
security system to ensure smooth operation and avoid compatibility issues that could compromise
system performance. By carefully considering these hardware specifications and selecting capacitors
that meet the system's requirements, manufacturers can design anti-theft vehicle security systems that
are reliable, efficient, and capable of providing robust protection against theft and unauthorized
access.

 Transistor: Transistors play a crucial role in anti-theft vehicle security systems, serving as key
components in controlling electronic signals and enabling various functionalities. When it comes to
their hardware specifications for such applications, several important factors are considered. Firstly,
the type of transistor is a significant consideration. Bipolar junction transistors (BJTs) and field-effect
transistors (FETs) are commonly used in anti-theft systems. BJTs are known for their amplification
capabilities and are often used in signal processing and switching circuits. FETs, on the other hand,
are preferred for their low power consumption and high input impedance, making them suitable for
low-power applications such as sensor interfaces. The transistor's voltage and current ratings are
crucial specifications. In anti-theft systems, transistors must be capable of handling the voltage and
current levels present in the circuitry without getting damaged. This is especially important in circuits
that control actuators such as door locks or engine immobilizers, where higher currents may be
involved. Additionally, the gain or amplification factor of the transistor is essential. This factor
determines how much the transistor can amplify an input signal, which is crucial for ensuring accurate
and reliable signal processing in security system functions like sensor readings or alarm triggers. The
switching speed of the transistor is another critical specification. In anti-theft systems, fast-switching
transistors are preferred for quick response times in activating security measures or responding to
detected threats. This helps in ensuring swift and effective actions to prevent unauthorized access or
theft. Temperature ratings are also important for transistors used in automotive environments. These
transistors must be able to operate within a wide temperature range without experiencing performance
degradation or failure, considering the temperature variations that vehicles can undergo during
operation. Furthermore, the package type and physical size of the transistor are considered for
integration into the vehicle's electronic system. Compact and rugged transistors are preferred to
withstand the harsh conditions of automotive environments, including vibrations, moisture, and
temperature fluctuations. Finally, compatibility with other components and subsystems within the
anti-theft system is crucial. Transistors must work seamlessly with sensors, controllers,
microcontrollers, and communication interfaces to ensure proper functionality and system
integration. By carefully selecting transistors with the right hardware specifications, manufacturers
can design anti-theft vehicle security systems that are reliable, efficient, and capable of providing
robust protection against theft and unauthorized access.

 Diodes: Diodes are essential components in anti-theft vehicle security systems, contributing to the
functionality and reliability of various electronic circuits within the system. When considering the
hardware specifications of diodes for such applications, several key factors come into play. Firstly,
the type of diode is a critical consideration. Common types of diodes used in anti-theft systems
include standard rectifier diodes, Schottky diodes, and zener diodes. Each type serves specific
purposes such as rectification, voltage regulation, or reverse polarity protection. The forward voltage
drop of the diode is an important specification. This voltage drop determines the voltage required for
the diode to start conducting current in the forward direction. In anti-theft systems, diodes with
appropriate forward voltage drops are chosen to ensure efficient energy transfer and proper circuit
operation. Reverse voltage and current ratings are crucial specifications for diodes in security
systems. These ratings indicate the maximum reverse voltage and current that the diode can withstand
without breaking down or getting damaged. Given the fluctuating electrical conditions in vehicles,
diodes with robust reverse voltage and current ratings are necessary to protect against voltage spikes
and reverse polarity events. Another important specification is the diode's maximum forward current
rating. This rating indicates the maximum continuous current that the diode can handle without
overheating or failing. In anti-theft systems, where diodes are often used in power supply circuits or
signal conditioning circuits, choosing diodes with sufficient forward current ratings is essential for
reliable operation. Temperature ratings are also critical for diodes used in automotive environments.
These diodes must be able to operate within a wide temperature range without experiencing
performance degradation or failure. Temperature-resistant diodes ensure consistent functionality
under varying temperature conditions inside the vehicle. The package type and physical size of the
diode are considerations for integration into the vehicle's electronic system. Compact and durable
diodes are preferred to withstand the mechanical stresses, vibrations, moisture, and temperature
fluctuations typically encountered in automotive environments. Furthermore, compatibility with
other components and subsystems within the anti-theft system is crucial. Diodes must work
seamlessly with sensors, controllers, microcontrollers, and communication interfaces to ensure
proper functionality and system integration. By selecting diodes with the right hardware
specifications, manufacturers can design anti-theft vehicle security systems that are reliable, efficient,
and capable of providing robust protection against theft and unauthorized access.

 Printed Circuit Board (PCB): The Printed Circuit Board (PCB) is a fundamental component in anti-
theft vehicle security systems, serving as the platform that integrates and connects various electronic
components and circuits within the system. When considering the hardware specifications of PCBs
for such applications, several key factors are taken into account. Firstly, the material used for the PCB
is crucial. High-quality and durable materials such as fiberglass-reinforced epoxy (FR-4) are
commonly chosen for anti-theft systems. These materials offer excellent electrical insulation,
mechanical strength, and resistance to environmental factors like moisture and temperature
fluctuations. The number of layers in the PCB is another important specification. Anti-theft vehicle
security systems may require complex circuitry and multiple electronic components, necessitating
PCBs with multiple layers for efficient routing of signals and power distribution. The number of
layers is determined based on the system's complexity and the space available within the vehicle. The
thickness of the PCB is also considered. Thicker PCBs offer better mechanical stability and can
withstand higher currents without warping or damage. In anti-theft systems, where reliability and
durability are paramount, choosing an appropriate thickness for the PCB ensures long-term
performance under automotive conditions. The copper weight or copper thickness of the PCB traces
is a critical specification. Adequate copper thickness ensures efficient current carrying capacity,
minimizes voltage drops, and reduces signal interference. Thicker copper traces are often preferred
in anti-theft systems to handle higher currents and improve overall system reliability. The PCB's
surface finish is another consideration. Surface finishes such as HASL (Hot Air Solder Leveling),
ENIG (Electroless Nickel Immersion Gold), or OSP (Organic Solderability Preservatives) provide
protection against oxidation, facilitate soldering, and enhance the PCB's overall reliability and
lifespan. The design and layout of the PCB play a significant role in anti-theft systems. Proper
component placement, signal routing, and ground plane design are essential for minimizing
electromagnetic interference (EMI), ensuring signal integrity, and optimizing the system's
performance. Additionally, factors such as solder mask color, silkscreen labeling, and component
mounting options may be specified based on aesthetic considerations, ease of assembly, and
maintenance requirements. Furthermore, compliance with industry standards and regulations, such
as IPC-A-600 for PCB manufacturing and assembly, is crucial to ensure quality, reliability, and safety
in anti-theft vehicle security systems. By carefully considering these hardware specifications and
working with experienced PCB manufacturers, designers can create PCBs that meet the specific
requirements of anti-theft systems, providing robust and dependable electronic integration for vehicle
security functionalities.

C. Software specification:

Flow chart of the proposed system

 Python: Python is a popular programming language known for its versatility and ease of use, making
it a suitable choice for implementing the software aspects of the smart car security system. In this
project, Python is utilized for inputting codes into the system, allowing for the seamless integration
of facial recognition algorithms and other functionalities. Python's extensive libraries and frameworks
provide developers with a wide range of tools to efficiently develop and deploy complex systems like
the smart car security setup. The simplicity and readability of Python code make it easier to maintain,
debug, and scale the software components of the security system, ensuring smooth operation and
effective user authentication processes. Overall, Python's flexibility, robustness, and community
support make it a valuable asset in the development of software solutions for advanced security
applications like the smart car security system.

 Open cv: Open CV, a popular computer vision library, plays a crucial role in the software
specification of the smart car security system. Open CV provides a wide range of tools and functions
for image processing, including facial recognition, which is essential for user authentication in the
security system. By leveraging Open CV, developers can implement sophisticated algorithms for face
detection, image manipulation, and pattern recognition within the system. This library enables the
system to capture, process, and analyze images from the USB camera, facilitating real-time face
detection and comparison with stored user data. Open CV's capabilities enhance the accuracy and
efficiency of the facial recognition process, contributing to the overall security and functionality of
the smart car security system.

 Reactjs: ReactJS is a popular JavaScript library by Facebook for building dynamic, high-
performance user interfaces, particularly single-page applications. It lets developers create reusable,
modular components, which simplifies code maintenance and boosts development efficiency. Key to
React’s performance is its virtual DOM, which updates only the necessary parts of the interface rather
than the whole page, making applications faster and smoother. React's declarative approach allows
developers to describe UI states, with React managing the updates as state changes occur, ensuring a
predictable and responsive user experience.

 Tailwindcss: Tailwind CSS is a utility-first CSS framework that provides developers with a set of
low-level, reusable classes to style elements directly in HTML, enabling rapid UI development
without writing custom CSS. Instead of predefined themes, Tailwind offers utility classes like `text-
center`, `bg-blue-500`, and `p-4` that can be combined to style components in a highly customizable
way, promoting flexibility and control over design. This approach allows for a consistent, responsive
design system without bloating CSS files, as only the utilities used in the project are included in the
final output.

 Github: GitHub is a platform for version control and collaborative coding, widely used by
developers to store, manage, and share code. Built on Git, a distributed version control system,
GitHub allows teams to track changes, collaborate in real-time, and manage project history across
different branches, enabling efficient workflows and smooth integration. GitHub offers features like
pull requests, issues, and code reviews to streamline collaboration, and it integrates well with various
development tools. Additionally, it provides cloud-hosted repositories, allowing both open-source
and private projects, making it essential for developers, companies, and open-source communities
worldwide.

 Vercel: Vercel is a cloud platform that enables developers to build, deploy, and manage web
applications with ease and speed. Known for its seamless integration with front-end frameworks like
Next.js, Vercel optimizes the development workflow by handling tasks like serverless deployments,
global content delivery, and automatic scaling. Developers can push code directly from Git
repositories, triggering fast, zero-configuration deployments with built-in preview environments for
collaborative testing. With its focus on performance, simplicity, and a robust global network, Vercel
is popular among teams and individual developers aiming to deploy high-performance websites and
applications efficiently.

 Google mediapipe api: Google MediaPipe is an open-source framework offering real-time, cross-
platform solutions for processing sensory data such as video, images, and audio. It provides ready-
to-use machine learning pipelines for tasks like face detection, hand tracking, and pose estimation,
which developers can easily integrate into applications for Android, iOS, and the web. MediaPipe is
optimized for performance, even on mobile devices, making it ideal for creating responsive,
interactive applications in fields like augmented reality, fitness, and gesture control. Its modular
design allows developers to customize and combine pipelines, enhancing flexibility for diverse use
cases.

 Nodejs: Node.js is an open-source, cross-platform runtime environment that allows developers to


run JavaScript code on the server side, outside of a web browser. Built on Google Chrome’s V8
JavaScript engine, Node.js enables fast and scalable back-end services by using a non-blocking,
event-driven architecture. This makes it ideal for building high-performance applications like real-
time chat, streaming, and APIs. With a rich ecosystem of libraries through npm (Node Package
Manager), Node.js simplifies the development process, allowing developers to handle both front-end
and back-end development in JavaScript, thus supporting a unified, full-stack development
experience.

 Tensorflowjs: TensorFlow is an open-source machine learning framework developed by Google that


simplifies the process of building, training, and deploying machine learning models. Initially
designed for deep learning tasks, TensorFlow has evolved into a versatile tool supporting a wide array
of machine learning applications across various platforms, from mobile devices to large-scale cloud
deployments. Its architecture allows developers to operate at different levels of abstraction, providing
high-level APIs like Keras for rapid prototyping, as well as lower-level operations for more detailed
control. A notable component, TensorFlow.js, brings machine learning capabilities to the web,
enabling models to run directly in browsers and leverage GPU processing for real-time applications.
This functionality is especially useful in web-based solutions, such as the real-time face recognition
system in this project. TensorFlow’s model hub also offers a range of pre-trained models—like
BlazeFace for face detection—that streamline development by allowing developers to integrate
advanced capabilities without building models from scratch. Its strong community and vast
ecosystem make TensorFlow a widely adopted and powerful tool for machine learning and AI.

 Blazeface: BlazeFace is a lightweight, real-time face detection model developed by Google, designed
specifically for mobile and web applications. Its architecture is optimized for speed and efficiency,
making it well-suited for applications where fast and reliable face detection is critical, such as
augmented reality, security, and real-time facial verification systems. BlazeFace works by locating
facial landmarks and drawing bounding boxes around faces within images or video frames, all while
maintaining high accuracy. The model’s small size and efficient processing allow it to run smoothly
even on devices with limited computing power, such as smartphones or web browsers via
TensorFlow.js. By leveraging BlazeFace, developers can easily integrate real-time face detection into
applications without the need for extensive computational resources, making it a popular choice for
browser-based and mobile face recognition systems.

6. PROPOSED SYSTEM
The task of the proposed system is to capture the face of each driver that the owner wants to store and to store
it in the database. The face of the driver needs to be captured in such a manner that all the features of the
driver's face need to be detected. In this proposed system, a low-cost extendable framework for smart car
security system is proposed, which consists of an FDS (Face Detection Subsystem), a GPS (Global Positioning
System) module, Bluetooth in the Raspberry Pi, and a control platform. The system described in this paper
automatically takes photos of drivers and compares his/her face with a database to check whether he is an
authenticated driver or not. The face detection subsystem bases on an optimized PCA algorithm and can detect
faces in cars. The other modules transmit necessary information to users and help to keep eyes on cars all the
time, even when the car is lost. This system prototype is built on Raspberry Pi and controls all the processes.
The owner is able to perform car stopping through the message from his mobile. The GPS module in the car
detects the location of the car. So, by this system the identification of the thief and the location of the car are
simply smarter and cheaper than the traditional one.

Block Diagram
● Here Raspbian OS is installed into the Raspberry Pi 4 Model B
● Power-supply of 5V, Pi Camera Module and 32 GB Memory Card acts as input modules
● Display and SQL Database acts as output module
● Pi Camera captures the image of the driver and compares his/her face with the help of SQL database.
To check whether he is an authenticated driver or not.
● The owner is made able to perform car stopping through the message from his/her mobile.
A. Working principle
The working principle of the proposed smart car security system involves several key steps to
insufficient operation and enhanced security measures:

● Face Detection and Authentication:

The system automatically captures images of the driver using the Face
Detection Subsystem (FDS).

Optimized face detection algorithms are employed to detect and extract facial
features. The captured face image is compared with the database to authenticate
the driver's identity.

● Authorization and Access Control:

Only authorized users with authenticated faces are granted access to the vehicle.
Unauthorized users are denied access, enhancing security measures.

● GPS Location Tracking:

The GPS module in the car detects and tracks the real-time location of the
vehicle. This enables precise location tracking, aiding in theft prevention and
recovery efforts.

● Remote Control Functionality:

Bluetooth connectivity allows for seamless communication between the


security system and the user's mobile device. Users can remotely control the
vehicle, such as stopping the car, through mobile commands sent via Bluetooth.

● Security Alerts and Notifications:

The system can send alerts and notifications to the user's mobile device in case
of unauthorized access or suspicious activity.

Real-time monitoring ensures prompt action in response to security threats.

● User Interaction and Control:

Users have the flexibility to interact with the system through mobile commands,
enabling convenient control over the vehicle's security status. Customizable
security protocols can be set based on specific requirements, enhancing user
experience and security customization.

● Integration with Smart Devices:

The system seamlessly integrates with smart devices, allowing users to monitor
and control their vehicle's security remotely. Integration with mobile
applications or connected platforms enhances accessibility and user experience.

By following these steps, the proposed system effectively combines face recognition technology, GPS
tracking, Bluetooth connectivity, and remote control functionalities to create a robust and intelligent
smart car security system.

B. Software Design
The software design of the proposed smart car security system involves a series of steps to ensure
effective implementation and operation:

● Facial Recognition Algorithm:

The software application is dedicated to facial recognition, automatically


identifying or verifying individuals based on facial features stored in the
database. Facial recognition algorithms compare new facial features from
captured images with those already uploaded, ensuring accurate identification.

● Face Detection Process:

The system captures the face of the driver using the USB Camera integrated
with the Raspberry Pi. The captured image is processed to extract facial
features, enabling accurate face detection and recognition.

● Database Management:

The system stores facial data of authorized users in a database for comparison
during the authentication process. The database management system ensures
efficient retrieval and comparison of facial features for authentication purposes.

● Image Processing and Comparison:


Captured images are processed using algorithms like Principal Component Analysis (PCA) to
extract facial data and create a facial signature. The system compares the facial signature of the
captured image with the database to determine authentication status.

● Alert Generation and Transmission:

In case of unauthorized access or suspicious activity, the system generates alerts


and notifications. Alerts are transmitted to the user's mobile device through
Bluetooth connectivity for immediate action.

● Remote Control Commands:

Users can send remote commands via mobile devices to control security
features, such as stopping the vehicle or enabling specific security
protocols.Remote control functionalities enhance user interaction and provide
quick responses to security threats.

● Real-Time Monitoring:

The system operates in real-time, providing instant alerts and notifications in


response to security breaches or unauthorized access attempts. Real-time
monitoring ensures proactive security measures and timely intervention.

● Integration with Raspberry Pi:

The software design is tailored to run on the Raspberry Pi platform, leveraging


its capabilities for efficient processing and control of security operations.

Raspberry Pi serves as the central control platform for managing face detection,
database operations, and communication with external devices.

By following these steps, the software design of the proposed system ensures seamless integration of
facial recognition technology, database management, real-time monitoring, and remote control
functionalities to enhance vehicle security and prevent unauthorized access.
C. Results
The results of the proposed smart car security system showcase the effectiveness of the implemented
features and technologies in enhancing vehicle security and preventing theft incidents:

● Authentication Accuracy:

The system demonstrates high accuracy in authenticating authorized users


based on facial recognition. Results show that only authorized users with stored
facial data are granted access to the vehicle, ensuring robust security measures.

● Real-Time Location Tracking:

The GPS module effectively tracks the real-time location of the vehicle,
providing precise location data. Results indicate that the system can accurately
detect the vehicle location, aiding in theft prevention and recovery efforts.

● Remote Control Functionality:

Users can successfully utilize remote control commands via mobile devices to
interact with the security system. Results show that users can remotely stop the
vehicle or activate security protocols, enhancing user control and convenience.

● Alert Generation and Notifications:

The system generates alerts and notifications in response to unauthorized access


attempts or suspicious activity. Results demonstrate the system ability to
promptly alert users of security breaches, enabling quick action and
intervention.

● User Interaction and Customization:

Users have the flexibility to customize security protocols based on specific


requirements. Results indicate that users can set access levels, define restricted
zones, and configure response mechanisms, enhancing security customization.

● Integration with Smart Devices:

The system seamlessly integrates with smart devices, allowing users to monitor
and control their vehicle security remotely. Results show that integration with
mobile applications or connected platforms enhances accessibility and user
experience.

● Overall System Performance:

The overall performance of the system in preventing theft incidents and


enhancing vehicle security is evaluated positively. Results highlight the system
apos;s cost-effectiveness, efficiency, and user-friendly interface, making it a
reliable anti-theft solution.

By analyzing these results, it is evident that the proposed smart car security system effectively
leverages advanced technologies like facial recognition, GPS tracking, and remote control
functionalities to provide a comprehensive and intelligent security solution for vehicles.
7. COST ANALYSIS
Components Website Cost

Raspberry pi 4 https://amzn.in/d/fBNtAFH ₹5499

DC motor https://www.amazon.in/dp/B082Z5S ₹92


S5N?ref=ppx_pop_mob_ap_share

PCB Board https://www.amazon.in/dp/B07PNR ₹99


82D2?ref=ppx_pop_mob_ap_share

16x2 LCD display https://www.amazon.in/dp/B00XT53 ₹219


RI0?ref=ppx_pop_mob_ap_share

https://www.amazon.in/ApTechDeal
s-Breadboard-point-jumper-
wires/dp/B07PRT1XFD/ref=sr_1_2
2?crid=1LX0645KDQV7&dib=eyJ2
IjoiMSJ9._k88aMc8HEUJmToujJW
1l6bp0OK599Vg070MBgVbtVZu39
466AXJbkYi5aJ6B3DRJ__kUYxNb
4fBu5o05Dnmzfur8zkuC6s_RhkWS
s3ntumnvv8J-
L8VNp0ndhpCMWrbR6s6Vn9QtcI
Breadboard wire TB_eDDPpW-6ILd0WNGwDw- ₹580
bundle OHgk7j7zkj6sQvG_wPNqqeIo_uC1
0p-fGu-
G9L7h9c4WcopaN6GcUx9gJomtyF
gAsKl27gkB5Ep85mW2P-
9eQ8wkCp1eusKS5tMac6Y4xXFA
1--
bwGvQo_8An6Uke49PN6wnTSfLq
c.Qm62G0e9UrTNr3z16DmLRjt9U
xqPfwMOPIWNyb1oDjE&dib_tag=
se&keywords=Breadboard+wire+bu
ndle&qid=1712031310&sprefix=bre
adboard+wire+bundle%2Caps%2C4
37&sr=8-22

Piezo Buzzer https://www.amazon.in/dp/B07MR2 ₹129


KN97?ref=ppx_pop_mob_ap_share

Switch https://www.amazon.in/dp/B07M9Z ₹119


3GFJ?ref=ppx_pop_mob_ap_share

https://www.amazon.in/HP-
Camera Webcam-Wide-Angle-Calling- ₹890
Microsoft/dp/B08FTFXNNB?th=1

Push Buttons https://www.amazon.in/dp/B07MDH ₹99


66DN?ref=ppx_pop_mob_ap_share

Raspberry pi power supply https://www.amazon.in/dp/B07XY8 ₹790


F3P7?ref=ppx_pop_mob_ap_share
Crystal Oscillator Offline store ₹25

Resistor https://www.amazon.in/Electrobot-
EBRTH02-Value-Resistor-
Pack/dp/B0716CR5JL/ref=sr_1_3?c
rid=5185GP4XHLO9&dib=eyJ2Ijoi
MSJ9.66O2RLEGA0MUmfijWtDO
Hiv8Lpj76Uti_XNMxRsY10zTc7E3
oHK6E3z6HA9hOcukzEqtY3F7NIF
8OOWl-
5jFwJUzFyoMAyJvFgQ_CIylntpU3
fbFdPgu6lWoalD0SBkGPlGCiiu1b0
₹325
cpZEiq8tZJ4H1Vq3YwFPD7UuZaC
8kFpPQoKhT3cQxYRCg9mjMzDD
QD-
5TLD7Jqn5VL4LNIY1NiZUKRYh-
VWe7ACHxauOZHuQTG4YEeUeL
5ylwzPZpqH77c92h0WxSCiZ6DV-
GQHy7dU3Q8jaDNRUrjBj27qtQVj
Os.r8bSMUGBYn0uzA4MglRGkE
VvxH2ifR9RzHxYLBwQQlQ&dib_
tag=se&keywords=resistor&qid=17
12037046&sprefix=resistor+%2Cap
s%2C727&sr=8-3

Capacitor https://www.amazon.in/dp/B08WKJ ₹279


TTYC?ref=ppx_pop_mob_ap_share

Transistor https://www.amazon.in/dp/B07LCN ₹550


SJCJ?ref=ppx_pop_mob_ap_share

Diode https://www.amazon.in/dp/B08LHB ₹99


F6BW?ref=ppx_pop_mob_ap_share
8. CONCLUSIONS

The smart car security system has revolutionized vehicle security by implementing advanced technologies and
robust theft control measures. Its integration of cutting-edge features such as facial recognition and GPS
tracking has significantly enhanced security protocols, making it highly effective in preventing theft and
unauthorized usage of vehicles. The system's predictive capabilities enable proactive measures against theft
incidents, adding an extra layer of security for vehicle owners. One of the system's standout features is its
support for investigators. By simplifying suspect identification through hijacker images, it aids law
enforcement in gathering crucial evidence for theft-related investigations. This not only streamlines
investigative processes but also contributes to a higher rate of successful apprehensions and prosecutions.
Moreover, the system's user-friendly design is worth noting. It allows vehicle owners to interact seamlessly
with the system, providing remote monitoring and management of security status. This level of accessibility
empowers users to take swift actions in response to security threats, thereby enhancing overall user experience
and control over vehicle security. In terms of cost-effectiveness, the smart car security system offers a
comprehensive solution that surpasses traditional security methods. Its utilization of innovative technologies
ensures reliability and effectiveness in safeguarding vehicles, making it a compelling choice for modern
vehicle security needs. In summary, the smart car security system represents a significant advancement in the
automotive industry, providing a comprehensive and intelligent approach to vehicle security. Its integration
of advanced technologies, user-friendly design, predictive capabilities, and support for investigators make it
a transformative solution that enhances security measures and mitigates theft risks effectively.
9. REFERENCES

1. S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z. Mushtaq, “Autonomous Vehicle


Monitoring Tracking System,” SCONEST 2005, pp. 1-4, 2005.
2. Joseph A. O’Sullivan, Robert Pless, “Advances in Security Technologies: Imaging, Anomaly
Detection, and Target and Biometric Recognition,” Microwave Symposium IEEE/MTT-S
International Volume, 2007.
3. Kar, Nirmalya, Mrinal Kanti Debbarma, Ashim Saha, and Dwijen Rudra Pal, "Study of
implementing automated attendance system using face recognition technique," International Journal
of computer and communication engineering 1, no. 2 (2012): 100.
4. F. Jakeer Hussain and T. Srinivas Reddy, "Advanced Anti-Theft ATM Security using Raspberry Pi",
International Research Journal of Engineering and Technology, Volume. 03 Issue. 08, e-ISSN: 2395-
0056, p- ISSN: 2395- 0072 Aug. 2016.
5. Shinde, Prashant A., and Y. B. Mane, "Advanced vehicle monitoring and tracking system based on
Raspberry Pi Intelligent Systems and Control (ISCO)", 2015 IEEE 9th International Conference on
IEEE, 2015.
6. Anandhalli M, Baligar VP, "A novel approach in real- time vehicle detection and tracking using
Raspberry Pi", Alexandria Engineering Journal, 57(3):1597- 607, 1 Sep. 2018.
7. Lee S, Tewolde, G, and Kwon, J, "Design and implementation of a vehicle tracking system using
GPS, GSM, GPRS technology and smartphone application In the Internet of Things(WF-IoT)", IEEE
World Forum, pp. 353- 358, IEEE 2014.
8. Liu, Z, Zhang, A and Li, S, (2013, July), "Vehicle anti-theft tracking system based on the Internet of
things In Vehicular Electronics and Safety (ICVES)", IEEE International Conference, pp. 48- 52,
2013.
9. Abdullah, Manal. “Optimizing Face Recognition Using PCA,” International Journal of Artificial
Intelligence & Applications, 3.2, pp: 236–31, 2012.
10. F. Jabeen, S. R. Rupanagudi and V. G. Bhat, "IoT based Smart Vehicle Ignition and Monitoring
System," International Conference on Advances in Computing, Communication and Control
(ICAC3), Mumbai, India, 2019, pp. 1-7, 2019.

You might also like