SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 48
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
Vedang Nikure1, Pranay Ikhar2, Vaibhav Kharalkar3, Jayant manapure4,
Sweta Choudhari5, Harshad Kubade6
1 Assistant Professor, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur,
Maharashtra, India.
2 UG Students, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur,
Maharashtra, India.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This initiative uses various GPS locations to
locate stolen or lost phones. After installation, the program
will run in the background. The unique user id and password,
SIM number, backup phone number, emailaddress, WhatsApp
number, and present location of thephoneareallstored inthis
application. When a phone is lost or stolen, the user receives
images taken by the front camera, a GPS location on a
different phone number, and an email address. With the help
of this information, we can quickly identify the phone and the
person who has stolen it using the intruder selfiefeature inthe
app.
Key Words: Mobile theft catcher, firebase, alert system,
android application, smart notification.
1.INTRODUCTION
On smartphones, sensitive info is stored in large quantities.
The combination of this knowledge and smartphones'
expensive price makes them a desirable target to feed
physical theft. It goes without saying that the device
proprietor would choose to reclaim the device in this
circumstance. The info must also be protected from
unauthorized access. In this research, we present the first
anti-theft strategy that addresses these issues. Our
recommendation is based on an innovative concept for a
theft-deterrent honeypot account that protects the person's
data while preventing a criminal from scrubbing the device
clean.
Today's cell phones cost anywhere from 50k to 1.5 lakh
rupees. Besides to the cash loss, a phone can also have its
confidential data lost or stolen. According to a survey, there
were more than 3.1 million missing smartphones in 2016. A
separate study found that victims would spend about Rs.
41,069.33 to get back all of their private data, including
photographs and videos. In turn, information leakage to the
criminal is prevented and there is a high probability that the
true owner of a stolen instrument will be able to retrieve it.
The smartphone is a necessity for everyone. They
significantly improve day-to-day living. Nowadays, people
use cell phones for a wide range of activities, such as taking
photos, viewing the internet, and conductingonline banking.
As shown in Figure 1. However, as malware becomes more
sophisticated and advanced, it has been discovered that the
perimeter defence strategy's joint efforts are becoming less
and less effective. Malware that is constantly changing
appears to always find methods to completely avoid the
perimeter defence. We provide a detailed description of the
most frequent exploitations at the hardware, software, and
network levels of the current information system. The
advantages and disadvantages ofthemostprevalentdefence
strategies employed in these levels are then covered
2. LITERATURE SURVEY
Priyadharshini S. et al, [2] Machine learning techniques
have been used in this study to identify malicious Android
applications. Open source datasets and Kaggle datasets are
the ones who acquire the datasets. Here, data preparation
and feature extraction methods are used to accelerate
algorithmcomputation.Applyingdatapre processingtodata
characteristics. In essence, it aids in normalizing the data
within a certain region. Data pruning methods for feature
extraction are employed. This document shows that data
science is used formalware detection andaims to expose the
use of machine learning (ML) methodologies for malware
research.
Iliyasu Yahaya Adam et al., [3], the research discusses some
security issues and potentialbenefitsofmobilephonetracker
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 49
technologies, particularly for companies that buy and sell
used mobile devices. Emerge in relation to the theft or
disappearance of phones. Police may become involved in
someof the instances astheyconductdigitalinvestigationsto
find the offenders. Some complainants' inability to provide
information that will help the police conduct a successful
investigation may lead to the mistaken apprehending of an
innocent person or people as the perpetrator of a crime
related to phone theft. In order to help phone owners and
prospective buyersandsellersofrefurbishedcellphoneswho
want to safeguard their handsets from other GSM-related
problems, the paper examines anti-theft and cellphone
tracking technologies.
Abdulaziz Aldegheishem et al., [4], two innovative ETD
models are created in this study. In the first model, a hybrid
sampling strategya syntheticminorityoversamplingmethod
with an edited nearest neighbor is presented. Additionally,
dimensionality reduction and information extraction from
data on energy consumption are done using AlexNet. A
moderate gradient boosting approach is then employed for
categorization. In the second model,theactualdistributionof
the data on electricity usage is captured using a conditional
Wasserstein generative stochastic network with a gradient
penalty. To create more accurate statistics for the minority
class, auxiliary provisional information is added to the
formula. Additionally, GooLeNet architecture is used to
minimize the dimensionality of the dataset.
Michael Becher et al., [5], the world is presently transitioning
from an Internet-based to amobile society,wherepreviously
unremarkable phones are being used for an increasing
amount of information access. For instance, between 2016
and 2023, the proportion of mobile phones with full-fledged
OS increased by almost 200%. Mobile protection is now
necessary rather than inevitable. This review article offers a
succinct summary of mobile phone security, attack vectors
using the back-end system and the browser itself, as well as
the layers of hardware and the user as an attack enabler. We
highlight the contrasts and parallels between "normal"
security and security for smartphones, and we conclude
future study directions.
Julian Jang-Jaccard et al., [6], the overwhelming majority of
businesses employ a perimeter defence security strategy to
shield their IT infrastructure from any potential outside
intrusion. This approach places a strong emphasis on
"layered defence" or "defense indepth"tactics,whichinvolve
fortifying and enclosing vital internal computer assets, such
as servers or sensitive data, to protect them.
Sanjana Kute et al., [7], the research that will be done for this
thesis will be primarily focused on designing and developing
an effective and convenient anti-theft device to address
security issues that will help to interrelationship/stop theft.
The suggested system offers house protection and
monitoring. Webcams with sensors installed assist in
identifying, notifying, and keeping users updated on
trespassing events.
Zhenyu Cheng et al., [8], in this article, we suggest theMobile
Users' Information defender model, whicheffectivelydetects
information theft by using convolutional neural networks to
analyse the relationship between users' functioningpatterns
and network flows. Most of the apps that steal collected
information can't function correctly in reality due to
Command-and-Control server invalidation, system version
incompatibility, etc.
A. Shabtai et al., [9], in this article, we introduce a novel
behavior-based anomaly identification method for the
network behavior of mobile applications. The mainobjective
of the suggested system is to safeguard users of mobile
devices and providers of cellular infrastructure from
fraudulent applications by first identifying malicious attacks
or applications that pose as legitimate ones that are installed
on a handheld device, and second identifying previously
published, well-liked applicationsthathavebeenrepackaged
with malicious code. More specifically, we try to identify a
brand-new class of mobile adware that can update itself that
was just discovered on the main Google Android market.
M. Conti et al., [10], this system wasfullyimplementedbythe
authors, and wealso carriedout a comprehensive set of tests
that demonstratethat approachcanachieveprecisionaswell
as accuracy levels higher than 92% for the majority of the
actions taken into consideration. Theauthorsofthisresearch
evaluated solutions to three cutting-edgealgorithms,andthe
results showed that our solution outperforms all of these
immediate rivals.
3. METHODOLOGY
3.1Problem Definition:
Personal data is on a mobile phone. There is a chance that
this information will be misused if the phone is taken. Any
issues, whether they be personal or financial, could arise.
Finding the stolen phone is therefore a crucial job. There are
some accessible technologies and methods. We can identify
the missing phone using that. If a phone is lost or stolen in
India, the procedureoffindingitbecomes extremelydifficult.
We must follow a drawn-out process and register a case at
the police station. To facilitate an easy and comfortable
procedure we came up with the idea of anti-theft mobile
application and its features are further elaborated in the
below section.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 50
3.2 Proposed Methodology:
App Working:
 Once deployed, it operates in thebackgroundsecretlytothe
thief.
 When a theft occurs, the application begins to function and
provides a real-time Google Maps position of the stolen
phone, as well as an automatic server data backup.
 Without the thief's knowledge, the application uses the
front camera to capture pictures and videos of him or her
and sends them along with their precise location to a
registered email address.
 The application will pretend to Fake Shut Down while
diverting the user's focus.
Regardless of whether the gadget has a mechanism for
locking or not, there are two ways that it can be stolen. If the
device is not secured by an unlocking mechanism, a thiefwill
have instant access to the owner's data and may misuse user
data on the device such as credentials to cause the owner
further damage. For as long as the mechanism for unlocking
is in position and the device is locked, it is useless to the
burglar. Because of this, it will probably happen that the
burglar will completely reset the device, which will result in
the loss of all user data. Nowadays, a lot of important private
data is stored on smartphones. Additionally, existing anti-
theft applications will also be removed from the device,
greatly decreasing the likelihood that the device's user can
recover it. [11] These two possibilities are not satisfactory.
Therefore, a solution is required that safeguards user data
security while preventing unauthorized factory resets of the
device. The authors of this work presentthefirstmethodthat
can safeguard the privacy of a device owner'suserdatawhile
prohibiting a thief from performing a factory reset and
erasingany anti theft software that has beenloaded.[11]By
activating theemergencywarning,TheftCatcher,alostphone
finder, makes sure that anyone who obtains your phone gets
into difficulty. Even if they switch off the device or activate
airplane mode. It will capture covert pictures of the intruder
and email them to you. To assist in locatingmissingphones,it
additionally includes a cellphone tracker. False Shutdown,
Fake Airplane Setting, and Intruder Detector are features of
Theft Catcher. All of theseweredesignedtonotifyyourfamily
to their safety and to send help.
Features of the Application
1. Emergency Contacts:
Hammer communicates live location updates,
photos, and audio files to those closest to you when
it senses an SOS.
2. Fake Shutdown:
Any tracking application in the universe is disabled
the moment your phone is turned off. We made the
decision to address the underlying issue as a result.
Hammer will pretend that your phone is shutting
down if someone attempts to do so, but it will
actually send your Emergency Contacts a live
location, pictures, and audio instead.
3. Fake Airplane Mode:
Hammer simulates an airplane mode state when
someone attempts to activate it, but instead sends
live location, photos, and audios to your contact list
for emergencies.
4. Intruder Selfie:
We will snap a photo of you and forward it to your
registered email if someone repeatedly tries to
unlock your cell device without success.
5. RESULT
Splish Screen:-
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 51
Setup Screen:-
Login Page:-
Mobile Information:-
Live Location:-
5. CONCLUSION
Our work on the Anti-Theft Mobile Application fulfils the
need of the user of the application for the protection of their
contacts, bank information, and other personal information
from thieves. With the help of firebase technology, we can
connect and send SMS to whoever we want, and with the
user's legal permission, the phone's camera and contact
access is taken to take action on the thief. The proposed
application is made using java technology as itsbackendand
XML for frontend designing. The suggested idea is adaptable
to different platforms and scenarios and is universal.
Although this method is a crucial advancement in the
creation of anti-theft mechanisms, it has more potential in
the future. Potential upgradesincludesafeguardingdifferent
user data repositories, like the SIM card and device
preferences. Since the SIM card is no longer frequently used
to store personal data as well as the device settings do not
hold highly sensitive information, these storages were not
considered in our approach. The development of alternative
methods that simulate the owner's account data from
throughout the honeypot account is another area of future
work. [11] The automatic or semi automatic generation of
false data is one of these methods.
6.REFERENCES
[1] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin
cybersecurity,," Journal of Computer and System Sciences,,
Vols. Volume 80, ISSN 0022-0000,, no. Issue 5,
https://doi.org/10.1016/j.jcss.2014.02.005., pp.Pages973-
993,, 2014,.
[2] S. P. a. S. Shanthi, "A Survey On Detecting Android
Malware Using Machine Learning Technique," 7th
International Conference on Advanced Computing and
Communication Systems (ICACCS), no. doi:
10.1109/ICACCS51430.2021.9441712., pp. pp. 1621-1627,,
Coimbatore, India, 2021,.
[3] C. V. A. V. Iliyasu Yahaya Adam, "Problems and Prospects
of Anti-Theft and Mobile Phone Tracking: A case in Nigeria,"
7th International Symposium on Digital Forensics and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072
© 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 52
Security (ISDFS), no. DOI:10.1109/ISDFS.2019.8757527,
June 2019.
[4] M. A. N. J. N. A. M. S. a. H. A. Abdulaziz Aldegheishem,
"Towards Sustainable Energy Efficiency with Intelligent
Electricity Theft Detection in Smart Grids Emphasising
Enhanced Neural Networks," IEEE Access, vol. VOLUME 9,
no. DOI - 10.1109/ACCESS.2021.30565664, 2021.
[5] F. C. F. J. H. T. H. S. U. C. W. Michael Becher, "Mobile
Security Catching Up? Revealing the Nuts and Bolts of the
Security of Mobile Devices," IEEE Symposium on Security
and Privacy, vol. 11 , no. DOI 10.1109/SP.2011.29, pp. 1081-
6011, 2011.
[6] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin
cybersecurity," Journal of Computer and System Sciences,
Vols. Volume 80, ISSN 0022-0000, no. Issue 5,
doi.org/10.1016/j.jcss.2014.02.005., pp. Pages 973-993,
2014.
[7] R. P. V. M. M. G. Sanjana Kute, "Theft Detection System,"
Iconic Research and Engineering Journals, vol. Volume 4
Issue 10, no. ISSN: 2456-8880, April 2021.
[8] X. C. Y. Z. S. L. a. J. X. Zhenyu Cheng, "MUI-defender: CNN-
Driven, Network Flow-BasedInformation TheftDetection for
Mobile Users," Lecture Notes of the Institute for Computer
Sciences, Social Informatics and Telecommunications
Engineering, Springer, vol. vol 268, no.
doi.org/10.1007/978-3-030-12981-1_23.
[9] L. T.-C. D. M. L. R. B. S. Y. E. A. Shabtai, "Mobile malware
detection through analysis of deviations in application
network behavior," Computers & Security, vol. Volume 43,
no. ISSN 0167-4048, doi.org/10.1016/j.cose.2014.02.009,
pp. Pages 1-18, 2014.
[10] L. V. M. R. S. a. N. V. V. M. Conti, "Analyzing Android
Encrypted Network Traffic to Identify User Actions,"inIEEE
Transactions on Information ForensicsandSecurity,vol.vol.
11, no. doi: 10.1109/TIFS.2015.2478741, pp. pp. 114- 125,
Jan. 2016.
[11] A. T. C. H. Sascha Groß, "ThiefTrap – An Anti-theft
Framework for Android," Security and Privacy in
Communication Networks, no. DOI:10.1007/978-3-319-
78813-5_9, pp. pp.167-184, January 2018.

More Related Content

Similar to ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION

AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy onijmnct
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelCSCJournals
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...AM Publications
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDr. Raghavendra GS
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docxaulasnilda
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic ChallengesCSCJournals
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android ProjectIRJET Journal
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONNana Kwame(Emeritus) Gyamfi
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRijtsrd
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 

Similar to ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION (20)

AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
Smartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process ModelSmartphone Forensic Investigation Process Model
Smartphone Forensic Investigation Process Model
 
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
A Comprehensive Study on Security issues in Android Mobile Phone — Scope and ...
 
Developing surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of thingsDeveloping surveillance challenges in theinternet of things
Developing surveillance challenges in theinternet of things
 
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx11272019 SafeAssign Originality Reporthttpsucumberlan.docx
11272019 SafeAssign Originality Reporthttpsucumberlan.docx
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Smartphone Forensic Challenges
Smartphone Forensic ChallengesSmartphone Forensic Challenges
Smartphone Forensic Challenges
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 
Women Safety Application Android Project
Women Safety Application Android ProjectWomen Safety Application Android Project
Women Safety Application Android Project
 
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATIONA BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
A BRIEF SURVEY OF MOBILE FORENSICS ANALYSIS ON SOCIAL NETWORKING APPLICATION
 
Adaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBRAdaptive Mobile Malware Detection Model Based on CBR
Adaptive Mobile Malware Detection Model Based on CBR
 
presentation
presentationpresentation
presentation
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 

ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 48 ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION Vedang Nikure1, Pranay Ikhar2, Vaibhav Kharalkar3, Jayant manapure4, Sweta Choudhari5, Harshad Kubade6 1 Assistant Professor, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur, Maharashtra, India. 2 UG Students, Department of Information Technology, Priyadarshini College Of Engineering, Nagpur, Maharashtra, India. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This initiative uses various GPS locations to locate stolen or lost phones. After installation, the program will run in the background. The unique user id and password, SIM number, backup phone number, emailaddress, WhatsApp number, and present location of thephoneareallstored inthis application. When a phone is lost or stolen, the user receives images taken by the front camera, a GPS location on a different phone number, and an email address. With the help of this information, we can quickly identify the phone and the person who has stolen it using the intruder selfiefeature inthe app. Key Words: Mobile theft catcher, firebase, alert system, android application, smart notification. 1.INTRODUCTION On smartphones, sensitive info is stored in large quantities. The combination of this knowledge and smartphones' expensive price makes them a desirable target to feed physical theft. It goes without saying that the device proprietor would choose to reclaim the device in this circumstance. The info must also be protected from unauthorized access. In this research, we present the first anti-theft strategy that addresses these issues. Our recommendation is based on an innovative concept for a theft-deterrent honeypot account that protects the person's data while preventing a criminal from scrubbing the device clean. Today's cell phones cost anywhere from 50k to 1.5 lakh rupees. Besides to the cash loss, a phone can also have its confidential data lost or stolen. According to a survey, there were more than 3.1 million missing smartphones in 2016. A separate study found that victims would spend about Rs. 41,069.33 to get back all of their private data, including photographs and videos. In turn, information leakage to the criminal is prevented and there is a high probability that the true owner of a stolen instrument will be able to retrieve it. The smartphone is a necessity for everyone. They significantly improve day-to-day living. Nowadays, people use cell phones for a wide range of activities, such as taking photos, viewing the internet, and conductingonline banking. As shown in Figure 1. However, as malware becomes more sophisticated and advanced, it has been discovered that the perimeter defence strategy's joint efforts are becoming less and less effective. Malware that is constantly changing appears to always find methods to completely avoid the perimeter defence. We provide a detailed description of the most frequent exploitations at the hardware, software, and network levels of the current information system. The advantages and disadvantages ofthemostprevalentdefence strategies employed in these levels are then covered 2. LITERATURE SURVEY Priyadharshini S. et al, [2] Machine learning techniques have been used in this study to identify malicious Android applications. Open source datasets and Kaggle datasets are the ones who acquire the datasets. Here, data preparation and feature extraction methods are used to accelerate algorithmcomputation.Applyingdatapre processingtodata characteristics. In essence, it aids in normalizing the data within a certain region. Data pruning methods for feature extraction are employed. This document shows that data science is used formalware detection andaims to expose the use of machine learning (ML) methodologies for malware research. Iliyasu Yahaya Adam et al., [3], the research discusses some security issues and potentialbenefitsofmobilephonetracker
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 49 technologies, particularly for companies that buy and sell used mobile devices. Emerge in relation to the theft or disappearance of phones. Police may become involved in someof the instances astheyconductdigitalinvestigationsto find the offenders. Some complainants' inability to provide information that will help the police conduct a successful investigation may lead to the mistaken apprehending of an innocent person or people as the perpetrator of a crime related to phone theft. In order to help phone owners and prospective buyersandsellersofrefurbishedcellphoneswho want to safeguard their handsets from other GSM-related problems, the paper examines anti-theft and cellphone tracking technologies. Abdulaziz Aldegheishem et al., [4], two innovative ETD models are created in this study. In the first model, a hybrid sampling strategya syntheticminorityoversamplingmethod with an edited nearest neighbor is presented. Additionally, dimensionality reduction and information extraction from data on energy consumption are done using AlexNet. A moderate gradient boosting approach is then employed for categorization. In the second model,theactualdistributionof the data on electricity usage is captured using a conditional Wasserstein generative stochastic network with a gradient penalty. To create more accurate statistics for the minority class, auxiliary provisional information is added to the formula. Additionally, GooLeNet architecture is used to minimize the dimensionality of the dataset. Michael Becher et al., [5], the world is presently transitioning from an Internet-based to amobile society,wherepreviously unremarkable phones are being used for an increasing amount of information access. For instance, between 2016 and 2023, the proportion of mobile phones with full-fledged OS increased by almost 200%. Mobile protection is now necessary rather than inevitable. This review article offers a succinct summary of mobile phone security, attack vectors using the back-end system and the browser itself, as well as the layers of hardware and the user as an attack enabler. We highlight the contrasts and parallels between "normal" security and security for smartphones, and we conclude future study directions. Julian Jang-Jaccard et al., [6], the overwhelming majority of businesses employ a perimeter defence security strategy to shield their IT infrastructure from any potential outside intrusion. This approach places a strong emphasis on "layered defence" or "defense indepth"tactics,whichinvolve fortifying and enclosing vital internal computer assets, such as servers or sensitive data, to protect them. Sanjana Kute et al., [7], the research that will be done for this thesis will be primarily focused on designing and developing an effective and convenient anti-theft device to address security issues that will help to interrelationship/stop theft. The suggested system offers house protection and monitoring. Webcams with sensors installed assist in identifying, notifying, and keeping users updated on trespassing events. Zhenyu Cheng et al., [8], in this article, we suggest theMobile Users' Information defender model, whicheffectivelydetects information theft by using convolutional neural networks to analyse the relationship between users' functioningpatterns and network flows. Most of the apps that steal collected information can't function correctly in reality due to Command-and-Control server invalidation, system version incompatibility, etc. A. Shabtai et al., [9], in this article, we introduce a novel behavior-based anomaly identification method for the network behavior of mobile applications. The mainobjective of the suggested system is to safeguard users of mobile devices and providers of cellular infrastructure from fraudulent applications by first identifying malicious attacks or applications that pose as legitimate ones that are installed on a handheld device, and second identifying previously published, well-liked applicationsthathavebeenrepackaged with malicious code. More specifically, we try to identify a brand-new class of mobile adware that can update itself that was just discovered on the main Google Android market. M. Conti et al., [10], this system wasfullyimplementedbythe authors, and wealso carriedout a comprehensive set of tests that demonstratethat approachcanachieveprecisionaswell as accuracy levels higher than 92% for the majority of the actions taken into consideration. Theauthorsofthisresearch evaluated solutions to three cutting-edgealgorithms,andthe results showed that our solution outperforms all of these immediate rivals. 3. METHODOLOGY 3.1Problem Definition: Personal data is on a mobile phone. There is a chance that this information will be misused if the phone is taken. Any issues, whether they be personal or financial, could arise. Finding the stolen phone is therefore a crucial job. There are some accessible technologies and methods. We can identify the missing phone using that. If a phone is lost or stolen in India, the procedureoffindingitbecomes extremelydifficult. We must follow a drawn-out process and register a case at the police station. To facilitate an easy and comfortable procedure we came up with the idea of anti-theft mobile application and its features are further elaborated in the below section.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 50 3.2 Proposed Methodology: App Working:  Once deployed, it operates in thebackgroundsecretlytothe thief.  When a theft occurs, the application begins to function and provides a real-time Google Maps position of the stolen phone, as well as an automatic server data backup.  Without the thief's knowledge, the application uses the front camera to capture pictures and videos of him or her and sends them along with their precise location to a registered email address.  The application will pretend to Fake Shut Down while diverting the user's focus. Regardless of whether the gadget has a mechanism for locking or not, there are two ways that it can be stolen. If the device is not secured by an unlocking mechanism, a thiefwill have instant access to the owner's data and may misuse user data on the device such as credentials to cause the owner further damage. For as long as the mechanism for unlocking is in position and the device is locked, it is useless to the burglar. Because of this, it will probably happen that the burglar will completely reset the device, which will result in the loss of all user data. Nowadays, a lot of important private data is stored on smartphones. Additionally, existing anti- theft applications will also be removed from the device, greatly decreasing the likelihood that the device's user can recover it. [11] These two possibilities are not satisfactory. Therefore, a solution is required that safeguards user data security while preventing unauthorized factory resets of the device. The authors of this work presentthefirstmethodthat can safeguard the privacy of a device owner'suserdatawhile prohibiting a thief from performing a factory reset and erasingany anti theft software that has beenloaded.[11]By activating theemergencywarning,TheftCatcher,alostphone finder, makes sure that anyone who obtains your phone gets into difficulty. Even if they switch off the device or activate airplane mode. It will capture covert pictures of the intruder and email them to you. To assist in locatingmissingphones,it additionally includes a cellphone tracker. False Shutdown, Fake Airplane Setting, and Intruder Detector are features of Theft Catcher. All of theseweredesignedtonotifyyourfamily to their safety and to send help. Features of the Application 1. Emergency Contacts: Hammer communicates live location updates, photos, and audio files to those closest to you when it senses an SOS. 2. Fake Shutdown: Any tracking application in the universe is disabled the moment your phone is turned off. We made the decision to address the underlying issue as a result. Hammer will pretend that your phone is shutting down if someone attempts to do so, but it will actually send your Emergency Contacts a live location, pictures, and audio instead. 3. Fake Airplane Mode: Hammer simulates an airplane mode state when someone attempts to activate it, but instead sends live location, photos, and audios to your contact list for emergencies. 4. Intruder Selfie: We will snap a photo of you and forward it to your registered email if someone repeatedly tries to unlock your cell device without success. 5. RESULT Splish Screen:-
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 51 Setup Screen:- Login Page:- Mobile Information:- Live Location:- 5. CONCLUSION Our work on the Anti-Theft Mobile Application fulfils the need of the user of the application for the protection of their contacts, bank information, and other personal information from thieves. With the help of firebase technology, we can connect and send SMS to whoever we want, and with the user's legal permission, the phone's camera and contact access is taken to take action on the thief. The proposed application is made using java technology as itsbackendand XML for frontend designing. The suggested idea is adaptable to different platforms and scenarios and is universal. Although this method is a crucial advancement in the creation of anti-theft mechanisms, it has more potential in the future. Potential upgradesincludesafeguardingdifferent user data repositories, like the SIM card and device preferences. Since the SIM card is no longer frequently used to store personal data as well as the device settings do not hold highly sensitive information, these storages were not considered in our approach. The development of alternative methods that simulate the owner's account data from throughout the honeypot account is another area of future work. [11] The automatic or semi automatic generation of false data is one of these methods. 6.REFERENCES [1] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin cybersecurity,," Journal of Computer and System Sciences,, Vols. Volume 80, ISSN 0022-0000,, no. Issue 5, https://doi.org/10.1016/j.jcss.2014.02.005., pp.Pages973- 993,, 2014,. [2] S. P. a. S. Shanthi, "A Survey On Detecting Android Malware Using Machine Learning Technique," 7th International Conference on Advanced Computing and Communication Systems (ICACCS), no. doi: 10.1109/ICACCS51430.2021.9441712., pp. pp. 1621-1627,, Coimbatore, India, 2021,. [3] C. V. A. V. Iliyasu Yahaya Adam, "Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria," 7th International Symposium on Digital Forensics and
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 10 Issue: 05 | May 2023 www.irjet.net p-ISSN: 2395-0072 © 2023, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 52 Security (ISDFS), no. DOI:10.1109/ISDFS.2019.8757527, June 2019. [4] M. A. N. J. N. A. M. S. a. H. A. Abdulaziz Aldegheishem, "Towards Sustainable Energy Efficiency with Intelligent Electricity Theft Detection in Smart Grids Emphasising Enhanced Neural Networks," IEEE Access, vol. VOLUME 9, no. DOI - 10.1109/ACCESS.2021.30565664, 2021. [5] F. C. F. J. H. T. H. S. U. C. W. Michael Becher, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," IEEE Symposium on Security and Privacy, vol. 11 , no. DOI 10.1109/SP.2011.29, pp. 1081- 6011, 2011. [6] S. N. Julian Jang-Jaccard, "A survey of emerging threatsin cybersecurity," Journal of Computer and System Sciences, Vols. Volume 80, ISSN 0022-0000, no. Issue 5, doi.org/10.1016/j.jcss.2014.02.005., pp. Pages 973-993, 2014. [7] R. P. V. M. M. G. Sanjana Kute, "Theft Detection System," Iconic Research and Engineering Journals, vol. Volume 4 Issue 10, no. ISSN: 2456-8880, April 2021. [8] X. C. Y. Z. S. L. a. J. X. Zhenyu Cheng, "MUI-defender: CNN- Driven, Network Flow-BasedInformation TheftDetection for Mobile Users," Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer, vol. vol 268, no. doi.org/10.1007/978-3-030-12981-1_23. [9] L. T.-C. D. M. L. R. B. S. Y. E. A. Shabtai, "Mobile malware detection through analysis of deviations in application network behavior," Computers & Security, vol. Volume 43, no. ISSN 0167-4048, doi.org/10.1016/j.cose.2014.02.009, pp. Pages 1-18, 2014. [10] L. V. M. R. S. a. N. V. V. M. Conti, "Analyzing Android Encrypted Network Traffic to Identify User Actions,"inIEEE Transactions on Information ForensicsandSecurity,vol.vol. 11, no. doi: 10.1109/TIFS.2015.2478741, pp. pp. 114- 125, Jan. 2016. [11] A. T. C. H. Sascha Groß, "ThiefTrap – An Anti-theft Framework for Android," Security and Privacy in Communication Networks, no. DOI:10.1007/978-3-319- 78813-5_9, pp. pp.167-184, January 2018.