Skip to main content

An Approach for Theft Detection and Alerting System

  • Conference paper
  • First Online:
Information Systems and Management Science (ISMS 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 521))

Included in the following conference series:

  • 378 Accesses

Abstract

Today there is a high rate of theft everywhere. Detecting the theft earlier is in high demand. The system which exists is popular using only using CCTV. But now a day’s lots of systems are available with many advanced algorithms. It makes the process more efficient. The proposed research work discusses face recognition and also weapon detection if the thieves brought weapons. In this system, a mobile application telegram is used. The image processing system is also used to implement the application. Wi-Fi module is used to send a photo of a person if he stands near the door. If an unknown person image is detected, then a buzzer will be triggered as an alarm, and then the owner can check the camera in the telegram application. The problems of the existing systems are the intruder can be identified after the theft. The human, along with the weapon, is also not detected in the existing approaches. The work carried out in this paper detect the unknown person and design a cost-effective and more efficient system to identify the theft in real-time and send the immediate notification of the theft to the owner for further action.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Naveenkumar, M., Vadivel, A.: OpenCV for computer vision applications. In: Proceedings of National Conference on Big Data and Cloud Computing (NCBDC’15) (20 Mar 2015)

    Google Scholar 

  2. https://towardsdatascience.com/face-detection-with-haar-cascade-727f68dafd08

  3. Albawi, S., Mohammed, T.A., AlZ, S.: Understanding of a convolutional neural network. International Conference on Engineering and Technology (ICET) 2017, 1–6 (2017). https://doi.org/10.1109/ICEngTechnol.2017.8308186

    Article  Google Scholar 

  4. Anvekar, R.G., Banakar, R.M.: IoT application development: home security system. IEEE Technological Innovations in ICT for Agriculture and Rural Development (TIAR) 2017, 68–72 (2017). https://doi.org/10.1109/TIAR.2017.8273688

    Article  Google Scholar 

  5. https://magpi.raspberrypi.org/articles/vnc-raspberry-pi

  6. Wang, Y., Ke, W., Wan, P.: A method of ultrasonic image recognition for thyroid papillary carcinoma based on deep convolution neural network. NeuroQuantology 16(5), 757–768 (2018). https://doi.org/10.14704/nq.2018.16.5.1306

    Article  Google Scholar 

  7. Al-Saffar, A.A.M., Tao, H., Talab, M.A.: Review of deep convolution neural network in image classification. In: 2017 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications

    Google Scholar 

  8. Abu-gellban, H., Nguyen, L., Moghadasi, M., Pan, Z., Jin, F.: LiveDI: An Anti-theft Model Based on Driving Behavior. IH&MMSec ’20, June 22–24, Denver, CO, USA (2020)

    Google Scholar 

  9. Rere, L.M.R., Fanany, M.I., Arymurthy, A.M.: Metaheuristic algorithms for convolution neural network. Comput. Intell. Neurosci. 2016, 1–13 (2016). https://doi.org/10.1155/2016/1537325

    Article  Google Scholar 

  10. Traore, B.B., Kamsu-Foguem, B., Tangara, F.: Deep convolution neural network for image recognition. Ecological Informatics 48, 257–268 (2018). https://doi.org/10.1016/j.ecoinf.2018.10.002

    Article  Google Scholar 

  11. Setjo, C.H., Achmad, B., Faridah: Thermal image human detection using Haar-cascade classifier. In: 2017 7th International Annual Engineering Seminar (InAES), pp. 1–6 (2017). https://doi.org/10.1109/INAES.2017.8068554

  12. Gangopadhyay, I., Chatterjee, A., Das, I.: Face detection and expression recognition using haar cascade classifier and fisherface algorithm. In: Bhattacharyya, S., Pal, S.K., Pan, I., Das, A. (eds.) Recent Trends in Signal and Image Processing: Proceedings of ISSIP 2018, pp. 1–11. Springer Singapore, Singapore (2019). https://doi.org/10.1007/978-981-13-6783-0_1

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. C. Manujakshi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Manujakshi, B.C., Ramesh, K.B., Garg, L., Shashidhar, T.M. (2023). An Approach for Theft Detection and Alerting System. In: Garg, L., et al. Information Systems and Management Science. ISMS 2021. Lecture Notes in Networks and Systems, vol 521. Springer, Cham. https://doi.org/10.1007/978-3-031-13150-9_47

Download citation

Publish with us

Policies and ethics