Amc Report !
Amc Report !
GANDHINAGR
PRESENTED BY: -
Abstract
The development of vehicular design brings public many conveniences in life but also brings many
problems at the same time, for example, traffic congestion, difficult in monitoring dispersive vehicle,
theft and other series of problems [3]. Due to the insecure environment the ratio of vehicle theft increases
rapidly. Because of this is manufacturers of luxury automobiles has the responsibilities for taking steps to
ensure the authorization for the owners and also in built the anti-theft system to prevent the vehicle from
theft. The proposed security system for smart cars used to prevent them from loss or theft using
Advanced RISC Machine (ARM) processor. It performs the real time user authentication (driver, who
starts the car engine) using face recognition, using the Principle Component Analysis (PCA) algorithm.
According to the comparison result (authentic or not), ARM processor triggers certain actions. If the
result is not authentic means ARM produces the signal to block the car access.
1. Introduction
Automatic face recognition is a widely used biological recognition technology. In comparison
with other identification methods, face recognition has direct, Friendly and convenient
features. Human can visually identify people by human face. People can be fairly identified
even in the very serious visual stimulated situation [2]. Now the market share of face
recognition is just less than the fingerprint recognition and the proportion are increasing,
which have broken the situation that fingerprints recognition monopolized the market in the
international biological recognition market. Therefore, it is very important for the research of
face recognition technology. This project, which is based on ARM11 and Linux operating
system, is a portable device and meets the requirements of up to date Identity Authentication;
it also can be used in many areas. The embedded face recognition system is based on ARM 11
development board, including transplantation of Linux operating system, the development of
drivers, detecting face by using face class Haar feature, and then recognizing face by using
PCA transform algorithm [1].
System test
Fig 3: The original forms of Haar-like features A. Face Detection
The face class Haar feature is used to detect human faces. As
Now we generate classifiers which are based on the basic shown in fig. 4
principles of Adaboost face detection.
Simple classifier: The input window x, is an eigenvalue of
the jth rectangle feature, the jth feature is generated into the
form of a simple classifier: indicated the value of a simple
classifier; is the threshold; indicated the direction of
inequality, the value is 1.
Strong classifier: the learning process of Adaboost algorithm
can be understood as “the process of greedy feature
selection." For solving a problem by weighted voting
mechanisms, with plenty of the weighted combination of
classification function to make the determination. The key of
algorithm is to give the good classification function a bigger
weight value; the bad one is given a smaller weight value.
Adaboost algorithm is a very good way that can find out a
few features to effectively classify target.
Cascade strong classifier: By Adaboost algorithm the strong Fig 4: original images
classifier is made of the important features, and can be used
to detect face. During the testing process due to have to Scan Final images of face detection by using face class Haar
all different sizes windows in tested image’s every position, feature are shown in fig. 5
the number of detection windows are so many. During the
process of actual facedetection we should adopt
B. Training Data of PCA
Now projecting the sample images into subspace,
gettingThe training data of PCA as shown in fig. 6
Then real-time getting human face image, using Euclidean
Distance measures the human face image, and testing the
100%
80%
60% Th3
Th2
40%
Fig 5: final images of face detection Th1
20%
0%
F1 F2 F3 F4 F5
Code implemented
; If theft detected, activate alarm and disable ignition via relay The present method the camera captures owner’s image
LDR R0, =0xE0028008 ; GPIO0 SET register address only. If the owner’s relatives or friends want to start the
LDR R1, [R0] vehicle it will not start. To overcome this one, we can
ORR R1, R1, ALARM_PIN ; Turn on alarm (P0.5) extend this project by storing multiple faces into the
ORR R1, R1, RELAY_PIN ; Turn on relay (P0.6, disablingignition) memory. If anyperson wants to start the vehicle, the
STR R1, [R0] camera compares the person’s image with the all-stored
images. If the result is matched the motor will start. In
; Delay to allow the alarm to ring for a while future we can extend this by sending the unknown
BL DELAY person’s image to the owner’s mobile as well as the
information to police control room for taking immediate
NO_THEFT: action.
; If no theft detected, turn off alarm and enable ignition LDR
R0, =0xE002800C ; GPIO0 CLR register addressLDR R1, References
[R0] 1. Shimin Wang, Jihua Ye College of Computer
BIC R1, R1, ALARM_PIN ; Turn off alarm (P0.5) Information Engineering “Research and
BIC R1, R1, RELAY_PIN ; Turn off relay (P0.6, enabling Implementationof Embedded Face Recognition
ignition) System Based on ARM 9” ©2010 IEEE W.-K. Chen,
STR R1, [R0] Linear Networks and Systems (Book style). Belmont,
CA: Wadsworth, 1993, pp. 123–135.
B LOOP ; Repeat the loop 2. Chellappa R,Wilson C L,Sirohey S “Human and
machine recognition of faces:A survey[J]”. Digital
DELAY: Object Identifier,1995,83(5):705-741.
MOV R2, #0xFFFFF ; Arbitrary delay count
DELAY_LOOP: 3. D. Narendra Singh (M.Tech,Ph.d), K. Tejaswi
SUBS R2, R2, #1 ; Decrement the delay count (M.Tech,) Dept. of Electronics Engineering Anurag
BNE DELAY_LOOP ; If not zero, continue delay group of Institutions, Hydrabad A.P. India Real
BX LR ; Return from subroutine Time