IoT Based Theft Detection Using Raspberry Pi

In the present day, Security and Safety are the major concern for the personage. We use C-Mount monitors in order to monitor and identify, but the C-mount has too much ability to record and needs staff to monitor the unlawful movement. Mobile device like Smart phones and I pad are used to perform daily tasks that are handle by commercial computers and laptop. Be overcome, we have found RP-3 model using IOT RP-3 model is much lowered compared to existing system with more appropriate settlement and less power use characteristics an “Internet Of Thing based Theft Detection using Raspberry Pi” Project where we had to use live video photo processing to espy stealer using motion as well as focus the area where motion reoccurred. In this model, we use a RP-camera together RP-3 model together with a route with Virtual show infrared for night and Thumb drive for Data Storage. The model uses imaging to espy and emphasize the exact filed of movement in the camera when camera movement is espying. The model now transmits photo of the event via Internet of Thing, which the End user can view online. It also stores the footage for additional reference in a Thumb drive. The End user can now convert online memory transmitted via Internet of Thing, the Internet of Thing model to view photo of the movements via the internet live. The model thus offers an extra powerful approach to Internet of Thing larceny espy.

[1]  R. S. Jadon,et al.  COMPARISON BETWEEN FACE RECOGNITION ALGORITHM-EIGENFACES, FISHERFACES AND ELASTIC BUNCH GRAPH MATCHING , 2011 .

[2]  Venkat Margapuri Smart Motion Detection System using Raspberry Pi , 2020, ArXiv.

[3]  Priya B. Patel,et al.  Smart Motion Detection System using Raspberry Pi , 2016 .

[4]  Chinmaya Kaundanya,et al.  Smart Surveillance System using Raspberry Pi and Face Recognition , 2017 .

[5]  Abdelmadjid Bouabdallah,et al.  M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.

[6]  Ajay Vikram Singh,et al.  Mitigation of DoS attacks by using multiple encryptions in MANETs , 2015, 2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions).

[7]  Ajay Rana,et al.  An Effective Approach to Build Optimal T-way Interaction Test Suites over Cloud Using Particle Swarm Optimization , 2012 .

[8]  Ajay Rana,et al.  Exploring routing with multiple Quality of Service parameters in High-Speed Networks , 2012, CCSEIT '12.

[9]  Umera Anjum,et al.  IOT Based Theft Detection using Raspberry Pi , 2017 .

[10]  Virginia Menezes,et al.  Surveillance and monitoring system using Raspberry Pi and SimpleCV , 2015, 2015 International Conference on Green Computing and Internet of Things (ICGCIoT).

[11]  S. P. Singh,et al.  Challenges of global stakeholder's in software release , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).

[12]  D. Gupta,et al.  Fibonacci driven novel test generation strategy for constrained testing , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[13]  M. Tech,et al.  Smart Surveillance System using Thing Speak and Raspberry Pi , 2015 .

[14]  Ajay Rana,et al.  Leveraging technology to build collaborative learning environment in academic institutes , 2013, 2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE).

[15]  Ajay Vikram Singh,et al.  Software defined network as solution to overcome security challenges in IoT , 2016, INFOCOM 2016.

[16]  Shivani Deshpande,et al.  Review on Theft Prevention System using Raspberry Pi and PIR Sensor , 2016 .

[17]  N. R. Raajan,et al.  Facial Recognition System Using Local Binary Patterns(LBP) , 2018 .

[18]  Ajay Rana,et al.  Online Mining of data to generate association rule mining in large databases , 2011, 2011 International Conference on Recent Trends in Information Systems.

[19]  Sunil Kumar Khatri,et al.  Security Implications in IoT using Authentication and Access Control , 2018, 2018 7th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO).

[20]  Adrian McEwen,et al.  Designing the Internet of Things , 2013 .

[21]  A. Rana,et al.  AN IMPROVISED APPROACH TO GENERATE SIGNIFICANT ASSOCIATION RULES FROM CUSTOMER TRANSACTION DATABASE- EMPIRICAL ANALYSIS , 2014 .

[22]  Arti Rana,et al.  Effect of Residual Defect Density on Software Release Management , 2011 .

[23]  Ajay Vikram Singh,et al.  Internet of things: Architecture, security challenges and solutions , 2017, INFOCOM 2017.