Face Recognition System for Prevention of Car Theft with Haar Cascade and Local Binary Pattern Histogram using Raspberry Pi
Abstract
In this era, the occurrence of vehicle theft has become a fairly frequent problem, especially in big cities like Jakarta and Surabaya. Although the technology for car security is very sophisticated (e.g. keyless system), but there are many cases that thieves still can break into the system. Once a car was stolen, the whereabouts of the car was unknown and the thief was on the loose. The goal of this research is to overcome this problem. As a device, this research works on Raspberry Pi 3 that connected with the Raspberry Pi Camera. Using the OpenCV library, with the Haar Cascade method for face detection, and Local Binary Pattern Histogram for face recognition. The device must be connected to the internet in order to send the information using a Telegram message. The research results show the success of the device system in face-recognizing between the car owner and car thief with optimal conditions in the morning until the afternoon with the light intensity around 660 to 1000 lux, and best recognizing distance at 50 cm. The success rate for obtaining the car’s location for the outdoor condition is 100%. Even if there is a slope or an error data, it can be tolerated because the difference was not too high, about 0.1-1.0 m.
Downloads
References
Suhepy Abidin, Deteksi Wajah Menggunakan Metode Haar Cascade Classifier Berbasis Webcam Pada Matlab, Jurnal Teknologi Elekterika Vol. 15, No. 1, 2018 DOI: https://doi.org/10.31963/elekterika.v15i1.2102
Cecep Nacepi, Pencurian Mobil Naik 100 Persen, Tahun 2018 Terdata Sebanyak 42 Kasus, Radar Cirebon, Report Number: -, 2019.
Aditi Shrikant, A new report shows that most keyless cars are easier to steal than previously thought, Vox Journalism, Report Number: -, 2019.
Nahdi Saubari, Deteksi Citra Wajah Dengan Metode Haar Feature Selection, Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) 4 (1), 7-12. 2019 DOI: https://doi.org/10.20527/jtiulm.v4i1.33
R. Purwanti, G. Ariyanto, Pengenalan Wajah Manusia Berbasis Algoritma Local Binary Pattern, Jurnal Emittor Vol. 17 No. 02, 2017 DOI: https://doi.org/10.23917/emitor.v17i2.6232
Septian Adi Wijaya, Perbandingan Metode Pengenalan Wajah Secara Real Time Pada Perangkat Bergerak Berbasis Android. Jurnal Sains, Teknologi dan Industri, Vol 14, No 1. 2016
Oktri Mohammad Firdaus, Analisis Implementasi Global Positioning System (GPS) pada Moda Transportasi di PT. “X”, Seminar on Application and Research in Industrial Technology, SMART, ISBN 978-602-97567-4-6
Hesti Rika, Mudahnya Sistem ‘Keyless’ Mobil Dibobol Pencuri, CNN Indonesia, Report Number : 22, 2019
K. Mistry, A. Saluja, An Introduction to OpenCV using Python with Ubuntu, International Journal of Scientific Research in Science, Engineering and Information Technology, Vol. 1, No. 2, pp. 65-68, 20
Ruihu Wang, AdaBoost for Feature Selection, Classification and Its Relation with SVM*, International Conference on Solid State Devices and Materials Science, Physics Procedia 25 ( 2012 ) 800 – 807 DOI: https://doi.org/10.1016/j.phpro.2012.03.160
J. Kaur, A. Sharma, Performance Analysis of Face Detection by using Viola-Jones algorithm, International Journal of Computational Intelligence Research, ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 707-717
D. A. Prasetya, I. Urviyanto, Deteksi Wajah Metode Viola Jones Pada OpenCV menggunakan Pemrograman Python, Simposium Nasional RAPI XI FT UMS, ISSN : 1412-9612
A. A. S. Gunawan, R. A. Prasetyo, Face Recognition Performance in Facing Pose Variation, CommIT (Communication & Information Technology) Journal 11(1), 1–7, 2017 DOI: https://doi.org/10.21512/commit.v11i1.1847
G. Bradski, A. Kaehler, “Learning OpenCV”, O’Reily Media, Inc (U. S. America), pp. 202-203, 2008
Wan Ulfa Nur Zuhra, “Jakarta, Kota dengan 9 Kasus Pencurian Setiap Hari”, Tirto.id, Report Number: -, 2019
D. Bradley, G. Roth, “Adaptive Thresholding Using the Integral Image”, Journal of Graphics Tools, Volume 12, Issue 2, pp 13-21. 2007. NRC 48816. DOI: https://doi.org/10.1080/2151237X.2007.10129236
B. S. B. Dewantara, J. Miura, “A Robust Illumination Invariant Face Recognition System and Its Implementation”, Machine Vision and Applications, vol. 27, no. 6, pp. 877-891, 2016. DOI: https://doi.org/10.1007/s00138-016-0790-6
Copyright (c) 2020 EMITTER International Journal of Engineering Technology
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The copyright to this article is transferred to Politeknik Elektronika Negeri Surabaya(PENS) if and when the article is accepted for publication. The undersigned hereby transfers any and all rights in and to the paper including without limitation all copyrights to PENS. The undersigned hereby represents and warrants that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required. The undersigned represents that he/she has the power and authority to make and execute this assignment. The copyright transfer form can be downloaded here .
The corresponding author signs for and accepts responsibility for releasing this material on behalf of any and all co-authors. This agreement is to be signed by at least one of the authors who have obtained the assent of the co-author(s) where applicable. After submission of this agreement signed by the corresponding author, changes of authorship or in the order of the authors listed will not be accepted.
Retained Rights/Terms and Conditions
- Authors retain all proprietary rights in any process, procedure, or article of manufacture described in the Work.
- Authors may reproduce or authorize others to reproduce the work or derivative works for the author’s personal use or company use, provided that the source and the copyright notice of Politeknik Elektronika Negeri Surabaya (PENS) publisher are indicated.
- Authors are allowed to use and reuse their articles under the same CC-BY-NC-SA license as third parties.
- Third-parties are allowed to share and adapt the publication work for all non-commercial purposes and if they remix, transform, or build upon the material, they must distribute under the same license as the original.
Plagiarism Check
To avoid plagiarism activities, the manuscript will be checked twice by the Editorial Board of the EMITTER International Journal of Engineering Technology (EMITTER Journal) using iThenticate Plagiarism Checker and the CrossCheck plagiarism screening service. The similarity score of a manuscript has should be less than 25%. The manuscript that plagiarizes another author’s work or author's own will be rejected by EMITTER Journal.
Authors are expected to comply with EMITTER Journal's plagiarism rules by downloading and signing the plagiarism declaration form here and resubmitting the form, along with the copyright transfer form via online submission.