CFP last date
22 April 2024
Reseach Article

Embedded Car Security System on Face Detection

Published on November 2011 by Vikram Kulkarni, K. Laxmi Narshima Rao
2nd National Conference on Information and Communication Technology
Foundation of Computer Science USA
NCICT - Number 3
November 2011
Authors: Vikram Kulkarni, K. Laxmi Narshima Rao
839781a7-7db0-4e59-bf03-8f39eda93f02

Vikram Kulkarni, K. Laxmi Narshima Rao . Embedded Car Security System on Face Detection. 2nd National Conference on Information and Communication Technology. NCICT, 3 (November 2011), 7-11.

@article{
author = { Vikram Kulkarni, K. Laxmi Narshima Rao },
title = { Embedded Car Security System on Face Detection },
journal = { 2nd National Conference on Information and Communication Technology },
issue_date = { November 2011 },
volume = { NCICT },
number = { 3 },
month = { November },
year = { 2011 },
issn = 0975-8887,
pages = { 7-11 },
numpages = 5,
url = { /proceedings/ncict/number3/4245-ncict018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd National Conference on Information and Communication Technology
%A Vikram Kulkarni
%A K. Laxmi Narshima Rao
%T Embedded Car Security System on Face Detection
%J 2nd National Conference on Information and Communication Technology
%@ 0975-8887
%V NCICT
%N 3
%P 7-11
%D 2011
%I International Journal of Computer Applications
Abstract

In this proposed embedded car security system, FDS (Face Detection System) is used to detect the face of the driver and compare it with the predefined face. For example, in the night when the car s owner is sleeping and someone theft the car then FDS obtains images by one tiny web camera which can be hidden easily in somewhere in the car. FDS compares the obtained image with the predefined images if the image doesn t match, then the information is sent to the owner through MMS. So now owner can obtain the image of the thief in his mobile as well as he can trace the location through GPS. The location of the car as well as its speed can be displayed to the owner through SMS. So by using this system, owner can identify the thief image as well as the location of the car This system prototype is built on the base of one embedded platform in which one SoC named SEP4020 (works at 100MHz) controls all the processes. Experimental results illuminate the validity of this car security system.

References
  1. S. Ajaz, M. Asim, M. Ozair, M. Ahmed, M. Siddiqui, Z. Mushtaq, “Autonomous Vehicle Monitoring & Tracking System,” SCONEST2005, pp. 1 – 4, 2005.
  2. Joseph A. O'Sullivan, Robert Pless, Advances in Security Technologies: Imaging, Anomaly Detection, and Target and Biometric Recognition”, Microwave Symposium IEEE/MTT-S International Volume, Page(s):761 – 764, 2007.
  3. Viola P, Jones M, “Rapid Object Detection using a Boosted Cascade of Simple Features” Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, p511, 2001.
  4. Lienhart R, Kuranov A, Pisarevsky, “Empirical analysis of detection cascades of boosted classifiers for rapid object detection” Technical report, MRL, Intel Labs, 2002.
  5. Viola P, Jones M, “Fast and robust classification using asymmetric AdaBoost and a detector cascade” NIPS 14, 2002.
  6. Goldberg D.E, “Genetic algorithms in search, optimization, and machine learning” Addison-Wesley, 1989.
  7. Xusheng Tang, Zongying Ou, Tieming Su, Pengfei Zhao, “CascadeAdaBoost Classifiers with Stage Features Optimization for Cellular Phone Embedded Face Detection System” Advances in Natural Computation, p. 688, 2005.
  8. Jianxin Wu, M. D. Mullin, J. M. Rehg, “Linear Asymmetric classifier for cascade detectors”, Conf Machine Learning, 2005.
  9. PU Han-lai, LING Ming, “Performance Oriented Customization of On-Chip Memory Capacity” Journal of Applied Sciences, p. 364, 2005.
  10. Zhang Yu, “Research on High Level Model and Performance Estimation” Southeast University PHD thesis, 2007.
  11. ARM Co., “ARM Developer Suite User’s guide” 2001.
  12. BioID Face Database.
Index Terms

Computer Science
Information Sciences

Keywords

Forward feature selection method ARM(Advanced RISC Machine)