SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1082
A review study on Vehicle Anti-Theft Immobilization System using Face
Recognition
Shreya Balasubramanian1, Aniket Ingle2, Nikita Joshi3, Sristi Kushwaha4, Mrs. Rasika Naik5
1-4 Student, Dept. of Electronics and Telecommunication Engineering, Vivekanand Education Society’s Institute of
Technology, Maharashtra, India
5 Assistant Professor, Dept. of Electronics and Telecommunication Engineering, Vivekanand Education Society’s
Institute of Technology, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - For preventing vehicle thefts, we propose an
advanced security system for vehicles based on facial
recognition using Raspberry Pi. It contains a facial detection
system that authorizes the user, and if the user isdiscoveredto
be unknown, the car is immobilized via a relay circuit in the
car’s internal circuitry, and a notification is issued to the user
via a mobile application. The authorized personnel can also
add other users and get the vehicle’s location as the GPS
(Global Positioning System) module, connected to the
Raspberry Pi, will store the location information inareal-time
database Google Firebase, which will provide the vehicle’s
location on the mobile application.
Key Words: Face Detection,Anti-theft,Vehicletracking,
Raspberry pi, Relay circuit, Vehicle Immobilization
1. INTRODUCTION
In today’s world, almost everyone owns a car. People are
concerned about advanced technologies in the automobile
industry since buying a car is such a large expenditure.
Today’s biggest issue for automobile ownersisthecontinual
concern of their vehicles being stolen from a public parking
lot or from outside their houses. Duplicates of car keys are
easy to create, and employing them raises the danger of
thievery. There has been a significantincreaseinautomobile
thefts as the number of vehicles on the road has increased.
Car security system design and analysis are continually
improving as a result of the expansion and use of various
Raspberry Pi techniques. Many modern techniques, such as
biometric recognition, image processing, communication,
and so on, have been integrated into vehicle security
systems. At the same time, the number of car accidents,
particularly fatalities, remains high. As a result, a practical
car security system should be efficient, sturdy, and
dependable. Traditional car security systems are expensive
and rely on a large number of sensors. When an automobile
is truly lost, no further feedback can be useful in assisting
people in locating it. We propose that the automobile
immobilization approach with face detection be used in car
security systems since it is efficient fast and cheap in that it
ensures that the theft is permanently prevented before it
even begins. Face detection algorithms have receiveda lotof
attention in recent years, and it is a significant computer
vision problem with applicationsinsurveillance,multimedia
processing, and consumer products. Many modern face
detection techniques have been developed in order to attain
a greater detection rate and a faster detection rate. By
interpreting the received GPS signal, the GPS module
determines the specific location.
Fig-1: Cases in the last 10 years (2011-2020),
A total of 307000 vehicles were stolen.
[Source:
<https://www.hindustantimes.com/cities/delhi-news/city-
of-cars-delhi-reports-maximum-vehicle-thefts-95-stolen-
everyday-ncrb-report-101631730601005.html >]
The Raspberry Pi control center module controls all
activities, including image acquisition, face detection, car
immobilization through relay, GPS data acquisition, and
notification to the user. According to Delhi Police personnel,
car theft accounts for around 14 percent of all crimes in the
city. Even during the first harsh lockdown, which restricted
people’s movement, between March 15 and 30, 2020, over
83 automobiles (more than three per hour) were stolen in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1083
Delhi. To limit the number of thefts, engineimmobilizersand
sophisticated alarm systems have become standard
equipment in many autos.
Despite the tough regulationsinplaceandsecuritymeasures
implemented by auto manufacturers and the government,
criminals have grown increasingly tech-savvy, discoveringa
plethora of ways to get access to vehicles. In this document,
we propose a new mechanism that would help prevent the
car from being stolen.
2. Literature Survey
S.Padmapriya et al.[1] proposed an improved face detection
and recognition method based on information of skin color.
Skin color detection is first performed on the input color
image to reduce the computational complexity.
Morphological operations were used which gives prior
knowledge for face detection. Here, the Adaboost algorithm
was used for face detection. By using principal component
analysis (PCA) algorithm,a specific facecanberecognizedby
comparing the principal components of the current face to
those of the known individuals in a facial database built in
advance. This method of security was cost efficient.
C. Nandakumar et al. [2] presentedan embeddedautomotive
security system involving face recognition. This system is
used to reduce the increased vehicle theft and allows the
owner to identify the intruder thereby having the vehicle
under control. Microprocessor(ARM7) isusedasthecontrol
unit in the system. The processing of images involves two
parts, face detection which makes use of Viola-Jones
Algorithm by cascade object detection and face recognition
which makes use of Linear Discriminant Analysis (LDA)
algorithm which performs the feature extraction of the
stored images in the database. When the image processing
unit classifies the image as unknown, the unauthenticated
face image is sent to the owner mobile through Multimedia
Messaging Services (MMS) using a GSM modem. The system
updates the GPS information about the vehicle location to
the owner.
Ahmed A. Elngar et al. [3] proposed a new intelligent vehicle
security system called VSS − IoT using a secure, efficient,
low-cost, and Low Power Processing chip with the Internet
as its important part. Moreover, this paper employed a
hybrid mechanism (Haar Cascade + PCA) for face detection
and recognition of the captured image by a USBcamera.This
system converts the images captured by the USB camera
installed in the vehicle to Gray-scale images to detect and
recognize faces in real-time. While PCA is a mathematical
method that is expressed as a transformation of high-
dimensional facial images into few-dimensional principal
components called Eigenface which is used to recognize
faces in the digital image.
The primary purpose of Prof. P.R. Shahane et al. [4] is to
reduce the number of vehicle theft usingfacedetectionby an
image processing algorithm. Only a set of authorized
members (feeded in the database) will be able to access the
ignition system. The face is detected and recognized using
Eigen Face in PCA algorithm. The recognized image is then
compared with the authorized image of the users in the
database. If the face is unauthorized, the system will not let
the engines turn on. The system will send a request to the
owner through a Local application using MQTT protocol
demanding a pass code to start the relay.
The paper [5] by Sagnik Basu Choudhuri et al. aims to
replace the existing RFID-based engine immobilizer with a
better and foolproof system which is achieved by
implementing Face Recognition as the primary defense
mechanism against vehicle theft, using NI LabVIEW and its
toolkits. A Third-Party Access modehasalsobeendeveloped
to help people who do not have their templates stored in the
system run the vehicle for a pre-programmed amount of
time. The Passive Defence System (PDS), which includes the
OTP generation and its mailing, is also implemented using
the State Machine in NI LabVIEW. A Transdermal Alcohol
Sensor interface is proposed which adds to the safety of the
driver and the surroundings by avoidingDrivinginImpaired
conditions. Apart from these, an ultrasonic sensor-based
guidance system is also integratedintothevehicleto provide
a guidance system to the driver during adversecasessuchas
heavy fog or poor visibility. All these systems work as a
package and offer greater passenger safety while reducing
the risk of vehicle theft.
The system proposed by Prof. M.M Bulhe et al. [6] consistsof
Raspberry pi as the central processing unit that receives the
data using a camera. This hidden camera captures the facial
data and sends it to the processing unit for comparison. A
database is maintained that contains the facial data as given
by the user and cannot be manipulated by any other
unauthorized user. This system also has a GSM module that
helps the CPU to generate SMS to the owner of the car when
unauthorized access is noticed. Then the CPU generates a
command that switches off the motor. The algorithm is
programmed in Raspberry pi which helps to compare
camera captured images with database information, it also
generates commands to operate other devices/components
or other add-ons as defined by the programmer.
Mahesh R. Pawar and Imdad Rizvi [7]proposedanIoTBased
Embedded System for Vehicle Security. The system is
designed and developed using raspberry pi, a high-
resolution camera, a vibration sensor and an open-source
software. For face recognition, ‘Local Binary Patterns
Histograms’ (LBPH) is used as it is simpler and gives better
results in different light conditions. The internal part of the
vehicle i.e., the key components of the vehicle (ignition
system) will be handled by the controlling unit. The
controlling unit and the owner’s device are connected
wirelessly and the other devices like sensors will be
interfaced using wired media. If the imagecaptureddoes not
match with the existing database (includes only the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1084
authorized members), an email of the picture is sent to the
owner.
3. Proposed Solution
The idea behind this project is to implement a security
system for vehicles using Raspberry pi which will help the
owner to authorize the accessibility and keep a track of his
vehicle through a mobile application.
The first step of this proposed system includes the face
recognition technique using Raspberry pi which provides
user authentication by verifying the real-time database of
authorized users. The Raspberry pi is programmed using
Python and connected to the real-time database.
Whenever a user tries to access the vehicle, Raspberry pi
captures an image and verifies it with the real-timedatabase
to provide authentication. If the user details are not present
in the database a notification is sent to the user on the
mobile application. Whenever the owner detects a
suspicious activity, he can get the current location of his
vehicle on the mobile application through the GPS module
installed in the project hardware circuitry.
When an unauthorized userisdetected,Raspberrypisendsa
signal to the relay circuit installed in the vehicle networking
system. This detected signal cuts off the fuel supply to the
engine hence, the mobility of the vehicle is restricted.
Another important feature of this proposed system is the
user-friendly mobile application. This applicationallowsthe
vehicle owner to authorize the new user by adding user
information into the real-time database and also allows
users to view the database of authorized users.
Appropriate implementation of all the functions and
methods proposed in this solution can build a securesystem
and provide foolproof protection against vehicle theft.
Fig-2: Proposed block diagram
Fig-3: Flowchart of the system
4. Methodology
A. Hardware:
As a user enters the automobile, an image is captured using
the pi camera. The Raspberry Pi includes pre-programmed
code that compares the taken image to the existing user
database created in Google’s real-time database firebase. If
the user’s face matches one of the users in the database, the
user is authorized and has control of the automobile;
otherwise, the fuel supply to the car is cut off.Thesystemwill
also send a notification to the authorized employees if an
unknown user attempts to enter the car. In addition, the
owner can use the mobile application to track the
whereabouts of the vehicle. A GPS module will save the
vehicle’s current location in Google’s database.
1) Raspberry Pi: The proposed system includes aRaspberry
Pi to execute facial recognition, database connection, and to
send notifications to the owner’s phone via a mobile
application. The user database is kept in the Raspberry Pi
memory unit. The Raspberry Pi does image detection and
recognition. It is also harnessed as a control platform forthis
project. In this system, we use the Raspberry pi 3B+ model
that works on a 64-bit quad-core processor running at
1.4GHz, has a dual-band of 2.4GHz and 5GHz wireless LAN,
Bluetooth 4.2/BLE, faster Ethernet, and PoE capability via a
separate PoE HAT. The Raspberry Pi 3 Model B+ maintains
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1085
the same mechanical footprint as both the Raspberry Pi 2
Model B and the Raspberry Pi 3 Model B.
2) Pi Camera:ThePicameramoduleisaportablelightweight
camera that works with the Raspberry Pi. It communicates
with the Raspberry Pi using the MIPI camera serial interface
protocol. It is most commonly utilized in image processing,
machine learning, and surveillance projects. The Pi Camera
module is a camera that can be used to take photos and
record high-definition videos. Raspberry Pi Board has CSI
(Camera Serial Interface)interfacetowhichwecanattachthe
PiCamera module directly. This Pi Camera modulecanattach
to the Raspberry Pi’s CSI port using a 15-pin ribbon cable.
Here, wehave used Pi camera v1.3. It hasa resolutionof5MP
and can capture wide, still (motionless) images of resolution
2592x1944 pixels.
3) GPS Module: The Global Positioning System (GPS) is a
satellite-based navigation system that delivers position and
timing information. Anyone with a GPS receiver and an
unobstructed line of sight to at least four GPS satellites can
use the system for free. A GPS receiver estimates its position
by accurately timing the signals supplied by GPS satellites.
The GPS module used in the proposedsystemisNEO-6Mthat
has a position update rate of 5Hz, a rechargeable battery for
Backup, EEPROM to save configuration settings, and an
operating temperature in the range -40 to 85°CUART TTL
socket.GPS is nowadays widely used and also has becomean
integral part of smartphones.
B. Software:
1) Face Recognition: A face recognition system is built using
pythonlibraries. OpenCVlibraryisusedforimportingimages
and pandas library is used for data analysis. The face
recognition library and OpenCV are used to process the
images captured throughthepi-camera.Thepythonprogram
uses Deep-Learning based facial embeddings which are
highly accurate up to 99.38 percent and are capable of being
executed in real-time. The face recognitionlibraryisapython
package that wraps dlib’s face recognition functions into a
simple, easy-to-use API. It helps in training the model by
obtaining the pattern and outlines of a person’s eyes, nose,
mouth, and chin.
2) Mobile Application: A mobile application integrated with
the hardware has been built usingAndroidStudioandFlutter
which will perform the following three functionalities:
i) Accessibility notification:
After face detection, a notification is sent to the owner when
an unauthorized user tries to access the vehicle. This
notification is received on the mobile application integrated
with the raspberry pi.
ii) Authorizing new users:
The mobile application has a user-friendly interface and
provides the feature of authorizing a new user. The vehicle
owner can authorize new users by adding their details to the
real-time database. The owner has to click on the upload
button present on the mobile applicationtosendthephototo
the database which contains the data of other authorized
users.
iii) Vehicle Tracking:
The mobile application also provides the feature of location
tracking. The owner can access the location of the vehicle at
any time whenever a suspicious activity is detected. This
tracking takes place through the GPS module connected to
the raspberry pi. The GPS module sends the location in the
form of latitude and longitude values to the real-time
database and these values reflect the current location of the
vehicle on the mobile application.
C. Car Immobilization Circuitry
In a vehicle circuitry, the fuse box is connected to several
components under the hood ofanautomobile,oneofwhichis
the fuel injector. The ECU (Electronic Control Unit) is
attached to one terminal of the injector, while the other is
connected to the fuse box, which is connected to a 12V
battery.ECU,theenginemanagementsystem’sheart,controls
fuel delivery, air management, fuel injection, and ignition.
Relays are electronic switches that open or close a circuit to
control its flow. So an automotive relay is installed between
the fuse box and the injector (figure 4). When the relay
receives a signal about unauthorized access from raspberry
pi it cuts off the fuel supply to the engine and restricts the
mobility of the vehicle.
Relays are also used to control high voltagecircuitsusinglow
voltage signals hence, to send signals to the vehicle’s
networking system through a low voltage signal device like
raspberry pi a relay is used. The relay alone cannot be
connectedas the raspberrypicangiveoutamaximumofonly
3.3V. Hence, a MOSFET is added to energize and de-energize
the relay without damaging the raspberry pi.
After the face detection process, one of the two outcomes
occurs: face recognized, not recognized. When theuser’sface
does not match with the database, the raspberry pi gives a
command to the relay which breaks the fuel injector circuit
thereby cutting off the fuel supply to the engine.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1086
Fig-4: Fuel Injector circuit diagram [Source:
< www.semanticscholar.org >]
5. Future Scope
The fuel injection circuitry of all commercial vehicles
controlled by the ECU (Electronic Control Unit)aregenerally
equipped with locks for protection to preventtheusersfrom
tampering with the circuit. In racecars, the case is slightly
different; instructions can also be given to the ECU to tune
and enhance the performance of the vehicle.
The On-Board Diagnostics (OBD) is a computer-based
system included in all automobiles andtrucksmanufactured
after 1996. ECU is the central part of the OBD system as it
collects various data from the sensors and uses it to control
different parts of the vehicle (eg. thefuel injector).Currently,
the OBD is used only to read the status of a vehicle. In near
future, this could be tweaked toreceiveinstructionsfrom the
user to improve the performance and security of the
vehicles.
In a commercial vehicle, different modesareavailablesports
mode, power mode, etc. for efficient usage. Similarly, a new
virtual mode, the “Theft Mode” could be added so that,
whenever an unauthorized user tries to access the vehicle,
the raspberry pi will send out specific codes given by the
manufacturer to the ECU to turn on the Theft Mode. These
codes will instruct the ECU to shut down the vehicle
networking system or turn on the sleep mode.
For this to occur, the ECU should be able to function bi-
directionally so that it can receive and execute the
instructions accordingly. Introducing this featuretotheECU
during the manufacturing stage itself will result in a reliable
and infallible secure system.
6. Conclusion
This paper proposes an efficient Vehicle anti-theft system
that includes Raspberry Pi as its core processing unit and
GPS module. With the help of this system, we can reduce the
vehicle theft issue significantly. It includes a Facial
Recognition system and a mobileapplicationwhichprovides
user-friendly features which will not only be useful to
eradicate the theft but also provide additional features like
authorization of new users by adding a new user to the
database and tracking the location of the car. The Facial
Recognition algorithm uses an efficientpythonprogramthat
gives excellent accuracy. In case of theft, when an
unauthorized person tries to access the vehicle, our system
provides an effective solution to prevent the unauthorized
user from accessing the vehicle by adding a relay to the
circuit thereby cutting off the fuel supply to the engine. By
using this system, we can ensure the safety of the vehicles
and can prevent the car from being stolen.
REFERENCES
[1] S.Padmapriya Esther Annlin KalaJames “Real-time
smart car lock security system using face detection
and recognition” Published in: International
Conference on Computer Communication and
Informatics, 2012.
[2] C. Nandakumar, G. Muralidaran and N. Tharani “Real
Time Vehicle Security System through Face
recognition” Division of Mechatronics, Department of
Production Technology, MadrasInstituteofTechnology,
Anna University, Chennai, INDIA.
[3] Ahmed A. Elngar and Mohammed Kayed, “Vehicle
Security Systems using Face Recognition based on
Internet of Things” Published in: International Journal
of Creative Research Thoughts (IJCRT), 2019.
[4] Prof. P.R. Shahane, Subhashi Gupta, Rajat Shrivastav,
Vignesh.S and Sushant Singh, “Vehicle Theft Detection
Using Face Recognition” Published in: International
Research Journal of Engineering and Technology
(IRJET).
[5] Prof. M.M Bulhe, Bhavika Mahale, Rashmi Borika
Prashant Nakade, ShreyasNimje“RaspberryPiVehicle
Anti-Theft Face Recognition System” Published in:
2020 International Research Journal ofEngineeringand
Technology (IRJET)
[6] Mahesh R. Pawar, Imdad Rizvi “IoT Based Embedded
System for Vehicle SecurityandDriverSurveillance”
Published in: 2018 2nd International Conference on
Inventive Communication and Computational
Technologies.
[7] Viska Mutiawani, Sarah Rahmany, Taufik Fuadi Abidin
“Anti-theftVehicleMonitoringandTrackingAndroid
Application Using Firebase as Web Service”
Published in: 2018 International Conference on
Electrical Engineering and Informatics (ICELTICs).
[8] V. Akila, K. Sriharshini, P. Sravani, D. Sravanthi, Rishita
Gopi “Intelligent Car Anti-Theft Face Recognition
System” Published in: International Journal of Online
and Biomedical Engineering
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1087
[9] Syed fasiuddin, Syed Omer, Dr. Khan Sohelrana, Amena
Tamkeen, Mohammed Abdul Rasheed “Raspberry Pi
Vehicle Anti-Theft Face Recognition System”
Published in: 2020 International Research Journal of
Engineering and Technology (IRJET).
[10] Kingshuk Mukherjee“Anti-TheftVehicleTrackingand
Immobilization System“ Published in: International
Conference on Power, Control and Embedded Systems
(ICPCES)

More Related Content

Similar to A review study on Vehicle Anti-Theft Immobilization System using Face Recognition

IRJET- Automatic Traffic Management System
IRJET- Automatic Traffic Management SystemIRJET- Automatic Traffic Management System
IRJET- Automatic Traffic Management System
IRJET Journal
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring System
IRJET Journal
 
IRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated VehicleIRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated Vehicle
IRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
IRJET Journal
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET Journal
 
Traffic Monitoring Using Visual Big Data Analytics in Smart Cities
Traffic Monitoring Using Visual Big Data Analytics in Smart CitiesTraffic Monitoring Using Visual Big Data Analytics in Smart Cities
Traffic Monitoring Using Visual Big Data Analytics in Smart Cities
IRJET Journal
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
IRJET Journal
 
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATORARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
IRJET Journal
 
IRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of ThingsIRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of Things
IRJET Journal
 
IRJET- Smart Parking System using IoT
IRJET-  	  Smart Parking System using IoTIRJET-  	  Smart Parking System using IoT
IRJET- Smart Parking System using IoT
IRJET Journal
 
IRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident AnalysisIRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET Journal
 
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
IRJET Journal
 
IRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR CodeIRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR Code
IRJET Journal
 
IRJET- Toll Collection Automation
IRJET-  	  Toll Collection AutomationIRJET-  	  Toll Collection Automation
IRJET- Toll Collection Automation
IRJET Journal
 
IRJET- Car Automation using IoT
IRJET-  	  Car Automation using IoTIRJET-  	  Car Automation using IoT
IRJET- Car Automation using IoT
IRJET Journal
 
An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoT
IRJET Journal
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics SystemIRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET Journal
 
Smart Car Parking system using GSM Technology
Smart Car Parking system using GSM TechnologySmart Car Parking system using GSM Technology
Smart Car Parking system using GSM Technology
dbpublications
 
IRJET- Smart Parking Assistance By Nameplate Recognition Using OCR
IRJET-  	  Smart Parking Assistance By Nameplate Recognition Using OCRIRJET-  	  Smart Parking Assistance By Nameplate Recognition Using OCR
IRJET- Smart Parking Assistance By Nameplate Recognition Using OCR
IRJET Journal
 

Similar to A review study on Vehicle Anti-Theft Immobilization System using Face Recognition (20)

IRJET- Automatic Traffic Management System
IRJET- Automatic Traffic Management SystemIRJET- Automatic Traffic Management System
IRJET- Automatic Traffic Management System
 
IRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring SystemIRJET - Smart Transportation Monitoring System
IRJET - Smart Transportation Monitoring System
 
IRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated VehicleIRJET- Smart Travel Automated Vehicle
IRJET- Smart Travel Automated Vehicle
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
Advanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle CommunicationAdvanced Driver Assistance System using Vehicle to Vehicle Communication
Advanced Driver Assistance System using Vehicle to Vehicle Communication
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
IRJET- Automatic Toll Collection System using ALPR and Biometrics System.
 
Traffic Monitoring Using Visual Big Data Analytics in Smart Cities
Traffic Monitoring Using Visual Big Data Analytics in Smart CitiesTraffic Monitoring Using Visual Big Data Analytics in Smart Cities
Traffic Monitoring Using Visual Big Data Analytics in Smart Cities
 
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
Vehicle Related Prevention Techniques: Pothole/Speedbreaker Detection and Ant...
 
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATORARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
ARDUINO BASED CAR PARKING SYSTEM USING WOKWI SIMULATOR
 
IRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of ThingsIRJET- Vehicle Monitoring System using Internet of Things
IRJET- Vehicle Monitoring System using Internet of Things
 
IRJET- Smart Parking System using IoT
IRJET-  	  Smart Parking System using IoTIRJET-  	  Smart Parking System using IoT
IRJET- Smart Parking System using IoT
 
IRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident AnalysisIRJET - Automobile Black Box System for Vehicle Accident Analysis
IRJET - Automobile Black Box System for Vehicle Accident Analysis
 
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
Automated Toll Collection System with Vehicle Categorization and Enhanced Sec...
 
IRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR CodeIRJET - Android based M-Application for Car Parking using QR Code
IRJET - Android based M-Application for Car Parking using QR Code
 
IRJET- Toll Collection Automation
IRJET-  	  Toll Collection AutomationIRJET-  	  Toll Collection Automation
IRJET- Toll Collection Automation
 
IRJET- Car Automation using IoT
IRJET-  	  Car Automation using IoTIRJET-  	  Car Automation using IoT
IRJET- Car Automation using IoT
 
An Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoTAn Overview of Traffic Accident Detection System using IoT
An Overview of Traffic Accident Detection System using IoT
 
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics SystemIRJET- Automatic Toll Collection System using ALPR and Biometrics System
IRJET- Automatic Toll Collection System using ALPR and Biometrics System
 
Smart Car Parking system using GSM Technology
Smart Car Parking system using GSM TechnologySmart Car Parking system using GSM Technology
Smart Car Parking system using GSM Technology
 
IRJET- Smart Parking Assistance By Nameplate Recognition Using OCR
IRJET-  	  Smart Parking Assistance By Nameplate Recognition Using OCRIRJET-  	  Smart Parking Assistance By Nameplate Recognition Using OCR
IRJET- Smart Parking Assistance By Nameplate Recognition Using OCR
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
ShahidSultan24
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
DuvanRamosGarzon1
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
Kamal Acharya
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 

Recently uploaded (20)

addressing modes in computer architecture
addressing modes  in computer architectureaddressing modes  in computer architecture
addressing modes in computer architecture
 
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSETECHNICAL TRAINING MANUAL   GENERAL FAMILIARIZATION COURSE
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSE
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 

A review study on Vehicle Anti-Theft Immobilization System using Face Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1082 A review study on Vehicle Anti-Theft Immobilization System using Face Recognition Shreya Balasubramanian1, Aniket Ingle2, Nikita Joshi3, Sristi Kushwaha4, Mrs. Rasika Naik5 1-4 Student, Dept. of Electronics and Telecommunication Engineering, Vivekanand Education Society’s Institute of Technology, Maharashtra, India 5 Assistant Professor, Dept. of Electronics and Telecommunication Engineering, Vivekanand Education Society’s Institute of Technology, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - For preventing vehicle thefts, we propose an advanced security system for vehicles based on facial recognition using Raspberry Pi. It contains a facial detection system that authorizes the user, and if the user isdiscoveredto be unknown, the car is immobilized via a relay circuit in the car’s internal circuitry, and a notification is issued to the user via a mobile application. The authorized personnel can also add other users and get the vehicle’s location as the GPS (Global Positioning System) module, connected to the Raspberry Pi, will store the location information inareal-time database Google Firebase, which will provide the vehicle’s location on the mobile application. Key Words: Face Detection,Anti-theft,Vehicletracking, Raspberry pi, Relay circuit, Vehicle Immobilization 1. INTRODUCTION In today’s world, almost everyone owns a car. People are concerned about advanced technologies in the automobile industry since buying a car is such a large expenditure. Today’s biggest issue for automobile ownersisthecontinual concern of their vehicles being stolen from a public parking lot or from outside their houses. Duplicates of car keys are easy to create, and employing them raises the danger of thievery. There has been a significantincreaseinautomobile thefts as the number of vehicles on the road has increased. Car security system design and analysis are continually improving as a result of the expansion and use of various Raspberry Pi techniques. Many modern techniques, such as biometric recognition, image processing, communication, and so on, have been integrated into vehicle security systems. At the same time, the number of car accidents, particularly fatalities, remains high. As a result, a practical car security system should be efficient, sturdy, and dependable. Traditional car security systems are expensive and rely on a large number of sensors. When an automobile is truly lost, no further feedback can be useful in assisting people in locating it. We propose that the automobile immobilization approach with face detection be used in car security systems since it is efficient fast and cheap in that it ensures that the theft is permanently prevented before it even begins. Face detection algorithms have receiveda lotof attention in recent years, and it is a significant computer vision problem with applicationsinsurveillance,multimedia processing, and consumer products. Many modern face detection techniques have been developed in order to attain a greater detection rate and a faster detection rate. By interpreting the received GPS signal, the GPS module determines the specific location. Fig-1: Cases in the last 10 years (2011-2020), A total of 307000 vehicles were stolen. [Source: <https://www.hindustantimes.com/cities/delhi-news/city- of-cars-delhi-reports-maximum-vehicle-thefts-95-stolen- everyday-ncrb-report-101631730601005.html >] The Raspberry Pi control center module controls all activities, including image acquisition, face detection, car immobilization through relay, GPS data acquisition, and notification to the user. According to Delhi Police personnel, car theft accounts for around 14 percent of all crimes in the city. Even during the first harsh lockdown, which restricted people’s movement, between March 15 and 30, 2020, over 83 automobiles (more than three per hour) were stolen in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1083 Delhi. To limit the number of thefts, engineimmobilizersand sophisticated alarm systems have become standard equipment in many autos. Despite the tough regulationsinplaceandsecuritymeasures implemented by auto manufacturers and the government, criminals have grown increasingly tech-savvy, discoveringa plethora of ways to get access to vehicles. In this document, we propose a new mechanism that would help prevent the car from being stolen. 2. Literature Survey S.Padmapriya et al.[1] proposed an improved face detection and recognition method based on information of skin color. Skin color detection is first performed on the input color image to reduce the computational complexity. Morphological operations were used which gives prior knowledge for face detection. Here, the Adaboost algorithm was used for face detection. By using principal component analysis (PCA) algorithm,a specific facecanberecognizedby comparing the principal components of the current face to those of the known individuals in a facial database built in advance. This method of security was cost efficient. C. Nandakumar et al. [2] presentedan embeddedautomotive security system involving face recognition. This system is used to reduce the increased vehicle theft and allows the owner to identify the intruder thereby having the vehicle under control. Microprocessor(ARM7) isusedasthecontrol unit in the system. The processing of images involves two parts, face detection which makes use of Viola-Jones Algorithm by cascade object detection and face recognition which makes use of Linear Discriminant Analysis (LDA) algorithm which performs the feature extraction of the stored images in the database. When the image processing unit classifies the image as unknown, the unauthenticated face image is sent to the owner mobile through Multimedia Messaging Services (MMS) using a GSM modem. The system updates the GPS information about the vehicle location to the owner. Ahmed A. Elngar et al. [3] proposed a new intelligent vehicle security system called VSS − IoT using a secure, efficient, low-cost, and Low Power Processing chip with the Internet as its important part. Moreover, this paper employed a hybrid mechanism (Haar Cascade + PCA) for face detection and recognition of the captured image by a USBcamera.This system converts the images captured by the USB camera installed in the vehicle to Gray-scale images to detect and recognize faces in real-time. While PCA is a mathematical method that is expressed as a transformation of high- dimensional facial images into few-dimensional principal components called Eigenface which is used to recognize faces in the digital image. The primary purpose of Prof. P.R. Shahane et al. [4] is to reduce the number of vehicle theft usingfacedetectionby an image processing algorithm. Only a set of authorized members (feeded in the database) will be able to access the ignition system. The face is detected and recognized using Eigen Face in PCA algorithm. The recognized image is then compared with the authorized image of the users in the database. If the face is unauthorized, the system will not let the engines turn on. The system will send a request to the owner through a Local application using MQTT protocol demanding a pass code to start the relay. The paper [5] by Sagnik Basu Choudhuri et al. aims to replace the existing RFID-based engine immobilizer with a better and foolproof system which is achieved by implementing Face Recognition as the primary defense mechanism against vehicle theft, using NI LabVIEW and its toolkits. A Third-Party Access modehasalsobeendeveloped to help people who do not have their templates stored in the system run the vehicle for a pre-programmed amount of time. The Passive Defence System (PDS), which includes the OTP generation and its mailing, is also implemented using the State Machine in NI LabVIEW. A Transdermal Alcohol Sensor interface is proposed which adds to the safety of the driver and the surroundings by avoidingDrivinginImpaired conditions. Apart from these, an ultrasonic sensor-based guidance system is also integratedintothevehicleto provide a guidance system to the driver during adversecasessuchas heavy fog or poor visibility. All these systems work as a package and offer greater passenger safety while reducing the risk of vehicle theft. The system proposed by Prof. M.M Bulhe et al. [6] consistsof Raspberry pi as the central processing unit that receives the data using a camera. This hidden camera captures the facial data and sends it to the processing unit for comparison. A database is maintained that contains the facial data as given by the user and cannot be manipulated by any other unauthorized user. This system also has a GSM module that helps the CPU to generate SMS to the owner of the car when unauthorized access is noticed. Then the CPU generates a command that switches off the motor. The algorithm is programmed in Raspberry pi which helps to compare camera captured images with database information, it also generates commands to operate other devices/components or other add-ons as defined by the programmer. Mahesh R. Pawar and Imdad Rizvi [7]proposedanIoTBased Embedded System for Vehicle Security. The system is designed and developed using raspberry pi, a high- resolution camera, a vibration sensor and an open-source software. For face recognition, ‘Local Binary Patterns Histograms’ (LBPH) is used as it is simpler and gives better results in different light conditions. The internal part of the vehicle i.e., the key components of the vehicle (ignition system) will be handled by the controlling unit. The controlling unit and the owner’s device are connected wirelessly and the other devices like sensors will be interfaced using wired media. If the imagecaptureddoes not match with the existing database (includes only the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1084 authorized members), an email of the picture is sent to the owner. 3. Proposed Solution The idea behind this project is to implement a security system for vehicles using Raspberry pi which will help the owner to authorize the accessibility and keep a track of his vehicle through a mobile application. The first step of this proposed system includes the face recognition technique using Raspberry pi which provides user authentication by verifying the real-time database of authorized users. The Raspberry pi is programmed using Python and connected to the real-time database. Whenever a user tries to access the vehicle, Raspberry pi captures an image and verifies it with the real-timedatabase to provide authentication. If the user details are not present in the database a notification is sent to the user on the mobile application. Whenever the owner detects a suspicious activity, he can get the current location of his vehicle on the mobile application through the GPS module installed in the project hardware circuitry. When an unauthorized userisdetected,Raspberrypisendsa signal to the relay circuit installed in the vehicle networking system. This detected signal cuts off the fuel supply to the engine hence, the mobility of the vehicle is restricted. Another important feature of this proposed system is the user-friendly mobile application. This applicationallowsthe vehicle owner to authorize the new user by adding user information into the real-time database and also allows users to view the database of authorized users. Appropriate implementation of all the functions and methods proposed in this solution can build a securesystem and provide foolproof protection against vehicle theft. Fig-2: Proposed block diagram Fig-3: Flowchart of the system 4. Methodology A. Hardware: As a user enters the automobile, an image is captured using the pi camera. The Raspberry Pi includes pre-programmed code that compares the taken image to the existing user database created in Google’s real-time database firebase. If the user’s face matches one of the users in the database, the user is authorized and has control of the automobile; otherwise, the fuel supply to the car is cut off.Thesystemwill also send a notification to the authorized employees if an unknown user attempts to enter the car. In addition, the owner can use the mobile application to track the whereabouts of the vehicle. A GPS module will save the vehicle’s current location in Google’s database. 1) Raspberry Pi: The proposed system includes aRaspberry Pi to execute facial recognition, database connection, and to send notifications to the owner’s phone via a mobile application. The user database is kept in the Raspberry Pi memory unit. The Raspberry Pi does image detection and recognition. It is also harnessed as a control platform forthis project. In this system, we use the Raspberry pi 3B+ model that works on a 64-bit quad-core processor running at 1.4GHz, has a dual-band of 2.4GHz and 5GHz wireless LAN, Bluetooth 4.2/BLE, faster Ethernet, and PoE capability via a separate PoE HAT. The Raspberry Pi 3 Model B+ maintains
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1085 the same mechanical footprint as both the Raspberry Pi 2 Model B and the Raspberry Pi 3 Model B. 2) Pi Camera:ThePicameramoduleisaportablelightweight camera that works with the Raspberry Pi. It communicates with the Raspberry Pi using the MIPI camera serial interface protocol. It is most commonly utilized in image processing, machine learning, and surveillance projects. The Pi Camera module is a camera that can be used to take photos and record high-definition videos. Raspberry Pi Board has CSI (Camera Serial Interface)interfacetowhichwecanattachthe PiCamera module directly. This Pi Camera modulecanattach to the Raspberry Pi’s CSI port using a 15-pin ribbon cable. Here, wehave used Pi camera v1.3. It hasa resolutionof5MP and can capture wide, still (motionless) images of resolution 2592x1944 pixels. 3) GPS Module: The Global Positioning System (GPS) is a satellite-based navigation system that delivers position and timing information. Anyone with a GPS receiver and an unobstructed line of sight to at least four GPS satellites can use the system for free. A GPS receiver estimates its position by accurately timing the signals supplied by GPS satellites. The GPS module used in the proposedsystemisNEO-6Mthat has a position update rate of 5Hz, a rechargeable battery for Backup, EEPROM to save configuration settings, and an operating temperature in the range -40 to 85°CUART TTL socket.GPS is nowadays widely used and also has becomean integral part of smartphones. B. Software: 1) Face Recognition: A face recognition system is built using pythonlibraries. OpenCVlibraryisusedforimportingimages and pandas library is used for data analysis. The face recognition library and OpenCV are used to process the images captured throughthepi-camera.Thepythonprogram uses Deep-Learning based facial embeddings which are highly accurate up to 99.38 percent and are capable of being executed in real-time. The face recognitionlibraryisapython package that wraps dlib’s face recognition functions into a simple, easy-to-use API. It helps in training the model by obtaining the pattern and outlines of a person’s eyes, nose, mouth, and chin. 2) Mobile Application: A mobile application integrated with the hardware has been built usingAndroidStudioandFlutter which will perform the following three functionalities: i) Accessibility notification: After face detection, a notification is sent to the owner when an unauthorized user tries to access the vehicle. This notification is received on the mobile application integrated with the raspberry pi. ii) Authorizing new users: The mobile application has a user-friendly interface and provides the feature of authorizing a new user. The vehicle owner can authorize new users by adding their details to the real-time database. The owner has to click on the upload button present on the mobile applicationtosendthephototo the database which contains the data of other authorized users. iii) Vehicle Tracking: The mobile application also provides the feature of location tracking. The owner can access the location of the vehicle at any time whenever a suspicious activity is detected. This tracking takes place through the GPS module connected to the raspberry pi. The GPS module sends the location in the form of latitude and longitude values to the real-time database and these values reflect the current location of the vehicle on the mobile application. C. Car Immobilization Circuitry In a vehicle circuitry, the fuse box is connected to several components under the hood ofanautomobile,oneofwhichis the fuel injector. The ECU (Electronic Control Unit) is attached to one terminal of the injector, while the other is connected to the fuse box, which is connected to a 12V battery.ECU,theenginemanagementsystem’sheart,controls fuel delivery, air management, fuel injection, and ignition. Relays are electronic switches that open or close a circuit to control its flow. So an automotive relay is installed between the fuse box and the injector (figure 4). When the relay receives a signal about unauthorized access from raspberry pi it cuts off the fuel supply to the engine and restricts the mobility of the vehicle. Relays are also used to control high voltagecircuitsusinglow voltage signals hence, to send signals to the vehicle’s networking system through a low voltage signal device like raspberry pi a relay is used. The relay alone cannot be connectedas the raspberrypicangiveoutamaximumofonly 3.3V. Hence, a MOSFET is added to energize and de-energize the relay without damaging the raspberry pi. After the face detection process, one of the two outcomes occurs: face recognized, not recognized. When theuser’sface does not match with the database, the raspberry pi gives a command to the relay which breaks the fuel injector circuit thereby cutting off the fuel supply to the engine.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1086 Fig-4: Fuel Injector circuit diagram [Source: < www.semanticscholar.org >] 5. Future Scope The fuel injection circuitry of all commercial vehicles controlled by the ECU (Electronic Control Unit)aregenerally equipped with locks for protection to preventtheusersfrom tampering with the circuit. In racecars, the case is slightly different; instructions can also be given to the ECU to tune and enhance the performance of the vehicle. The On-Board Diagnostics (OBD) is a computer-based system included in all automobiles andtrucksmanufactured after 1996. ECU is the central part of the OBD system as it collects various data from the sensors and uses it to control different parts of the vehicle (eg. thefuel injector).Currently, the OBD is used only to read the status of a vehicle. In near future, this could be tweaked toreceiveinstructionsfrom the user to improve the performance and security of the vehicles. In a commercial vehicle, different modesareavailablesports mode, power mode, etc. for efficient usage. Similarly, a new virtual mode, the “Theft Mode” could be added so that, whenever an unauthorized user tries to access the vehicle, the raspberry pi will send out specific codes given by the manufacturer to the ECU to turn on the Theft Mode. These codes will instruct the ECU to shut down the vehicle networking system or turn on the sleep mode. For this to occur, the ECU should be able to function bi- directionally so that it can receive and execute the instructions accordingly. Introducing this featuretotheECU during the manufacturing stage itself will result in a reliable and infallible secure system. 6. Conclusion This paper proposes an efficient Vehicle anti-theft system that includes Raspberry Pi as its core processing unit and GPS module. With the help of this system, we can reduce the vehicle theft issue significantly. It includes a Facial Recognition system and a mobileapplicationwhichprovides user-friendly features which will not only be useful to eradicate the theft but also provide additional features like authorization of new users by adding a new user to the database and tracking the location of the car. The Facial Recognition algorithm uses an efficientpythonprogramthat gives excellent accuracy. In case of theft, when an unauthorized person tries to access the vehicle, our system provides an effective solution to prevent the unauthorized user from accessing the vehicle by adding a relay to the circuit thereby cutting off the fuel supply to the engine. By using this system, we can ensure the safety of the vehicles and can prevent the car from being stolen. REFERENCES [1] S.Padmapriya Esther Annlin KalaJames “Real-time smart car lock security system using face detection and recognition” Published in: International Conference on Computer Communication and Informatics, 2012. [2] C. Nandakumar, G. Muralidaran and N. Tharani “Real Time Vehicle Security System through Face recognition” Division of Mechatronics, Department of Production Technology, MadrasInstituteofTechnology, Anna University, Chennai, INDIA. [3] Ahmed A. Elngar and Mohammed Kayed, “Vehicle Security Systems using Face Recognition based on Internet of Things” Published in: International Journal of Creative Research Thoughts (IJCRT), 2019. [4] Prof. P.R. Shahane, Subhashi Gupta, Rajat Shrivastav, Vignesh.S and Sushant Singh, “Vehicle Theft Detection Using Face Recognition” Published in: International Research Journal of Engineering and Technology (IRJET). [5] Prof. M.M Bulhe, Bhavika Mahale, Rashmi Borika Prashant Nakade, ShreyasNimje“RaspberryPiVehicle Anti-Theft Face Recognition System” Published in: 2020 International Research Journal ofEngineeringand Technology (IRJET) [6] Mahesh R. Pawar, Imdad Rizvi “IoT Based Embedded System for Vehicle SecurityandDriverSurveillance” Published in: 2018 2nd International Conference on Inventive Communication and Computational Technologies. [7] Viska Mutiawani, Sarah Rahmany, Taufik Fuadi Abidin “Anti-theftVehicleMonitoringandTrackingAndroid Application Using Firebase as Web Service” Published in: 2018 International Conference on Electrical Engineering and Informatics (ICELTICs). [8] V. Akila, K. Sriharshini, P. Sravani, D. Sravanthi, Rishita Gopi “Intelligent Car Anti-Theft Face Recognition System” Published in: International Journal of Online and Biomedical Engineering
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 10 | Oct 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1087 [9] Syed fasiuddin, Syed Omer, Dr. Khan Sohelrana, Amena Tamkeen, Mohammed Abdul Rasheed “Raspberry Pi Vehicle Anti-Theft Face Recognition System” Published in: 2020 International Research Journal of Engineering and Technology (IRJET). [10] Kingshuk Mukherjee“Anti-TheftVehicleTrackingand Immobilization System“ Published in: International Conference on Power, Control and Embedded Systems (ICPCES)