IoT Based Anti-Theft System

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 16

BAHIR DAR UNIVERSITY

BAHIR DAR INSTITUTE OF TECHNOLOGY


ELECTRICAL AND COMPUTER ENGINEERING FACULTY
COMPUTER ENGINEERING DEPARTMENT

Title: IoT based Anti-Theft system

By
NAME ID
Amanuel Minychil 0905671
Samuel Alene 0905033
Mahidermariyam Tadesse 0800988
Natnael Assefa 0904906

Advisor: Asaminew Gizaw

Jul, 2021
Bahir Dar, Ethiopia
Declaration
We are students of Bahir Dar University in Bahir Dar Institute of technology (BIT), faculty of
Electrical and Computer Engineering. The information found in this proposal project is our
original work. And all sources of materials that will be used for the project work will be fully
acknowledged.

Name Signature

1. ________________________ ____________

2. ________________________ ____________

3. ________________________ ____________

4. ________________________ ____________

Date of Submission:

This project proposal has been submitted for examination with our approval as a university
advisor.

Project advisor Signature Date

Asaminew Gizaw _________ ___________

i|Page
Contents
Declaration..................................................................................................................................i
List of abbreviations.................................................................................................................iii
List of tables..............................................................................................................................iv
List of figures.............................................................................................................................v
1. Introduction............................................................................................................................1
2. Literature review....................................................................................................................2
3. Statement of the problem.......................................................................................................5
4. Objective of the study............................................................................................................6
4.1 General objective..............................................................................................................6
4.2 Specific objective.............................................................................................................6
5. Methodology..........................................................................................................................6
6. Scope of the study..................................................................................................................7
7. Significance of the study........................................................................................................7
8. Work plan...............................................................................................................................8
9. Budget plan............................................................................................................................9
References................................................................................................................................10

ii | P a g e
List of abbreviations
IOT………………………... Internet of Things
UV………………………… Ultra-Violet
MCU……………………… Micro Controller Unit
CCTV……………………... Closed Circuit Television
WSN……………………… Wireless Sensors Network
IR…………….…………… Infra-Red
PIR…………...………….... Proximity Sensor
SMS………………………. Short Message Service
PC………………………… Personal Computer
DVR………………………. Digital Video Recorder

iii | P a g e
List of tables
Table 1 Work plan.................................................................................................................................8
Table 2 Budget Plan..............................................................................................................................9

iv | P a g e
List of figures
Figure 1 Flow chart of methodology..........................................................................................7

v|Page
1. Introduction

Security mostly refers to protection from hostile forces, but it has a wide range of other
senses: for example, as the absence of harm; as the presence of an essential good;
as resilience against potential damage or harm; as secrecy; as containment; and as a state of
mind.

Security and safety have always become a basic necessity for the urban population. With the
rapid urbanization and development of big cities and towns, the graph of crimes is also on the
rise. A home security system is a network of devices that work together to secure your home.
When someone breaks into your home while your alarm is enabled, they will trigger one of
the sensors, be it at an entry point such as a window or door or within a room. When they do,
the sensors communicate a breach to the owner of house, which respond on the thing it
supposed to do. If you have a professionally monitored system, the authorities will also be
alerted to the break-in. There are home security systems to large scale enterprise network
which have plenty of cameras and personal. We will be seeing home security since our
projects rewinds only on home security systems There are many kinds of security usage one
of them is using CCTV camera. CCTV works by the camera or cameras taking a constant
sequence of images that are then transmitted by cable or wirelessly (depending on the chosen
system type) to the recording device and then on to the display monitor, which enables an
individual to see the sequence of images as video footage. Depending on the type of cameras
used, they may also have the ability to zoom in and out and rotate 360 degrees, but most
people can’t use CCTV because of its high price, a person to monitor.

We are proposing a system that is easy to use, low cost compare to others and works any time
in need to secure and guard our house in our absence, we propose the IoT based Anti-theft
System. This system monitors anything in front of the door for movement. One single step
anywhere in front of the floor is tracked and user is alarmed over SMS text. This system is
secure door connected with IoT when we go out of house, the system is to be turned on, then
whoever comes around the house it passes the information over IoT. This system powered is
by microcontroller it includes, two tiles for demonstration purpose, PIR sensor, camera, Wi-
Fi modem. Whenever a thief approaches the house, it is immediately sensed by the sensor
which passes on the signal to the controller. The controller in turn processes it to be valid
signal and then the camera takes a picture where movement was detected and then transmits

vi | P a g e
it over the internet to the home owner to check the image. In case the home owner is not
online since he/she was alarmed by text he/she will immediately check for their email.

2. Literature review

U. Sirisha et al. what they did is that whenever a thief approaches the house, and steps on the
floor immediately it is sensed by the sensor which passes on the signal to raspberry pi
controller. One single step anywhere on the floor is tracked and user is alarmed through mail
over IoT. In this system, secure flooring tile connected with IoT, when the system is to be
turned on, then whoever comes inside the house it passes the information over IoT. Whenever
the thief enters in the house, and steps on the floor immediately it is sensed by the sensor
which passes on the signal to raspberry pi controller. The controller in turn processes it to be
valid signal and then moves the camera to the area where movement was detected and then
transmits it over the Internet for the home owner to check the image. In this project raspberry
pi 3B+ (model) has been used as heart of system[ CITATION USi20 \l 2057 ].

This proposed system is an intelligent system and it eliminates the need of continuous by
human resource. Thus, any human extra work is ruled out. This system continuously checks
the status of place by sensors that Is anyone entering in the shop or not. And sends the alert
message to the owner with live images by rotating camera with different angles. In this
security system human bodies are detected by Piezo sensor. The main aim of this project is to
make an automated security system for Banks and jewellery shops. The project consists of
Raspberry Pi with sensor and camera. The whole system is placed in that place. If system
detect someone in Bank/shop it sets the capture the live images and sent it on e-mail. The
research work that is carried out in this thesis would be mainly focused to design and develop
efficient and convenient motion detection surveillance i.e., an Anti-Theft device to solve
security problems which will help to reduce/stop theft. This system is suitable for small
personal area surveillance i.e., personal office cabin, bank locker room, parking entrance.
Whenever the motion is detected through[ CITATION USi20 \l 2057 ].

S. Pandya et al. their proposed research methodology aims to design a generally


implementable framework for providing a house owner/member with the immediate
notification of an on-going theft (unauthorized access to their premises). For this purpose, a
rigorous analysis of existing systems was undertaken to identify research gaps. The problems
found with existing systems were that they can only identify the intruder after the theft, or

vii | P a g e
cannot distinguish between human and non-human objects. Wireless Sensors Networks
(WSNs) combined with the use of Internet of Things (IoT), Cognitive Internet of Things,
Internet of Medical Things, and Cloud Computing are expanding smart home concepts and
solutions, and their applications. The primary objective of the present research work was to
design and develop IoT and cloud computing based smart home solutions. In addition, they
also propose a novel smart home anti-theft system that can detect an intruder, even if they
have partially/fully hidden their face using clothing, leather, fiber, or plastic materials. The
proposed system can also detect an intruder in the dark using a CCTV camera without night
vision facility. The fundamental idea was to design a cost-effective and efficient system for
an individual to be able to detect any kind of theft in real-time and provide instant notification
of the theft to the house owner. The system also promises to implement home security with
large video data handling in real-time. This research paper presents an innovative method to
prevent smart home theft by providing spontaneous notification of on-going
intrusion[ CITATION Pan18 \l 2057 ].

The research has provided a novel wireless sensing system for the surveillance and detection
of a human intruder as well as instant notification of the intrusion to prevent theft. It
eliminates the use of DVR for recording as well as the use of large amounts of memory for
storage. The system can effectively identify a human intruder and prevent false alarms when
the intruder is a non-human, by distinguishing between human and non-human objects. All of
these processes lead to the instant notification of intrusion by providing real-time notification
about the potential theft. The theft system has detected the presence of the intruder even if the
face of an intruder is partially or fully hidden with some type of plastic, leather, fibber, or
other material. Moreover, this system does not need any supervision. The information for the
caregiver as well as authorized authority is uploaded to a website, either by the local home
gateway server or cloud server. New research challenges of security and privacy have arisen
due to an increase in products that connect the cyber and physical worlds. It is expected that
these research problems will be further resolved in the upcoming future by fellow
researchers[ CITATION Pan18 \l 2057 ].

Sanjana K. et al. in their work IoT with Raspberry pi has been implemented for home security
through embedded system and an interface has given to all cell phones which belong to
members of home. Theft detection is a tracking technology used to identify and authenticate
tags that are applied. This project has IR sensor that senses the culprit and camera clicks the

viii | P a g e
picture, so that an image along with an alert message is sent to server from which the owner
gets notified through SMS message. In this system, the doors are automatically locked and
alerts the surrounding by blowing an alarm as soon as the motion of the intruder is detected.
The camera records the video and uploads it on the cloud server. The camera in this system
also works in dark environments[ CITATION Kut21 \l 2057 ].

The research work that will be carried out in this thesis would be mainly focused to design
and develop efficient and convenient motion detection surveillance i.e., an Anti-Theft device
to solve security problems which will help to reduce/stop theft. This system is suitable for
small personal area surveillance i.e., personal office cabin, bank locker room, parking
entrance. Whenever the motion is detected through. The main Advantage of the project is
Easy to implement, Low cost with High quality. Captured image can be used as strong
evidence for further investigation. Also, this system is scalable and flexible. By covering all
these objectives, they conclude that system is successfully implemented. They have
successfully implemented and designed a cost-effective Raspberry PI based home security
system. The proposed system provides home security and surveillance. Deploying sensors,
webcam helps to detect, report and monitor intrusion events to users. Also, the system
informs to the neighbourhood using buzzer, thereby reducing damages caused by burglary.
The use of cloud network in the system allows for storage of captured images and recorded
videos. By integrating cloud networking and wireless communication a fully functional home
security system can be designed and built[ CITATION Kut21 \l 2057 ].

Hyenkyun W. et al. proposed a new model for robust, reliable and fast segmentation, which
detects a rough shape feature of a moving object irrespective of the noise and contrast
variations of an image. The performance of motion detection algorithms, embedded in closed
circuit television (CCTV) camera and digital video recorder (DVR), usually depends upon
the preselected motion sensitivity level, which is expected to work in all environmental
conditions. Due to the preselected sensitivity level, false alarms and detection failures usually
exist in video surveillance systems[ CITATION Woo10 \l 2057 ].

The proposed motion detection model based upon variational energy provides a robust
detection method at various illumination changes and noise levels of image sequences
without tuning any parameter manually. They analyzed the structure mathematically and
demonstrated the effectiveness of the proposed model with numerous experiments in various
environmental conditions. Due to the compact structure and efficiency of the proposed

ix | P a g e
model, it could be implemented in a small embedded system to reduce false alarms and
detection failure in various environmental conditions, then they developed a motion detection
method based upon variational energy. The energy functional of the proposed model is
designed to provide motion detection without tuning parameters so as to have environmental
robustness. They supported their model through the analysis on the behaviour of its
minimizer and demonstrate the effectiveness of the proposed model with numerous
experiments in various environmental conditions. Without changing the parameter, motion
detection is successful in various environmental conditions. Due to the compact structure and
the efficiency of the proposed model, it could be implemented in a small embedded system
and it provides real time motion segmentation (0.008 s on a PC with a Pentium 3.0 GHz
CPU) with very low false alarms and high detection rates. They observed that their model
does not handle all situations, for examples, swaying trees, silhouettes and fountains. They
notice that those problems are directly related to background modelling. For more reliable
motion detection algorithm, they needed to adjust the background estimation following
statistical changes in image sequences. Future work includes the characterization of the
statistics in background modelling and incorporating such statistical information in a new
model [ CITATION Woo10 \l 2057 ].

3. Statement of the problem

The problems we identified and wanted to solve are as a whole securing our home and
belongings. In this particular area we noticed there are a lot of drawbacks in the existing
systems as they are not secure, cheap or trustworthy for example Usage of computer software
to control security system was widely accepted, and only authorized person will have access
to the system which determines the room security. This feature can stop unauthorized person
from taking control of the system or gain access to the security system. This is very important
to make sure that the system is secure, but this is not so reliable. And hiring a security guard
is not such a good idea either because of a lot of reasons and finally installing a CCTV
camera for security purposes is good but it’s so costly and it can easily be identified by
thieves and they can stop the camera from working and do whatever they want as the owner
could not supervise the video streamed by the camera all the time. So, we propose our
solution that we think is a better idea than the above discussed and existing systems. Our
system is a security system that is able to inform the owner in real time if there is any breach
to their premises also it works whenever it is in need. In order to implement the system must

x|Page
have small devices that are reliable and fast to build an embedded system which can alert the
owner and capture a photo when a possible burglary happens. Our system is almost safest
because it is hidden like for example embedded inside doors.

So, our system will be

 Easy to install
 Cheapest
 Secure and
 Hidden

4. Objective of the study


4.1 General objective

The general objective of this study is to develop a home security system that is able to detect
someone’s movement around the door and notify the owner to take actions.

4.2 Specific objective

 Construct it on the breadboard

 To develop a software using any available software to program the security system for
the controller

 To develop a module that detect motion near to the door and notify owner

 Immediately after motion is detected start the camera and take a picture

 Analyzing the photo for that thing in the picture is a human being or not

 Develop a module that sends the image to the owner via email if something suspicious
found

5. Methodology

We plan to use Arduino Uno or Node MCU, the open source and user-friendly hardware,
with Wi-Fi connectivity portable to laptops and PCs. The whole idea is implemented using
number of modules to do the following tasks in an instant someone’s movement is monitored
by a sensor outside the house. Once a movement is detected by the PIR sensor a notification

xi | P a g e
will be sent to the owner through SMS after an image captured by the camera and analyzed
for detection and identification and after that if there is something suspicious it sends an
email to the owner by attaching the photo that was taken by the camera that is attached to the
controller.

Figure 1 Flow chart of methodology

6. Scope of the study

Our proposed system is to develop number of modules in order to alert the owner if an
intruder has breached his/her property, captures a photo analyze it and send an email for
better usage. And will not use any preventive method also this system can be used for small
office or one way room and not intended for a large area with multiple ways.

7. Significance of the study

Security is a big issue where assuring your home from thief is one of your main priority it
might be from simply our cloth to our hard copy flies, television, refrigerator personal
computer or the files in your PC securing these items is a must.

xii | P a g e
So, in order to do that we build an anti-theft system which cost us less with no extra human
intervention and can be up whenever we want and also which is very easy to maintain.

Having a security system like ours helps to

 Protect private information

 Keeps personal belongings safe

 Peace of mind

 Secure items from getting robbed

By this system people with office, apartment, warehouse, basement, where anyone must not
enter (except authorized person) like data centers, laboratory (especially chemical) and where
gas leakage might be a problem, are benefited with this system.

We believe this project will be very helpful and down to earth that is able to keep criminals
away and as a whole one step to decrease the exceeding number of burglars.

Our system is almost safest because it is hidden like for example embedded inside doors.

8. Work plan

Stage of the project Days/weeks Start date End date

STAGE 1: Reading and research Week 1-2 July 20

1) Reading and research into chosen topic Week 1-2 July 20

STAGE 2: Building the circuit Week 2-4 August 3

1) Collect all the information and select the Week 2-3 August 3
best way to do the circuit

2) Design and setup Week 4 August 17

3)Develop steps to conduct the experiment Week 4 August 20

STAGE 3: Implementing Week 5-8 August 23

1) Write the program Week 6 August 23

2) uploading the program and check if it Week 7 August 30

xiii | P a g e
works

3) Test the program and take the result Week 8 September 3

4) See the results and analyze the efficiency Week 8 September 6

STAGE 4: Documentation Week 8-10 September 8

1) Collect and compile sections and finish Week 8-10 September 8


documentation for submission
Table 1 Work plan

9. Budget plan

Table 2 Budget Plan

S.No Description Unit Qty Amount


1 Node MCU or Arduino Uno controller 1 3500

2 Bread Board 1 200

3 Jumping wires wires 7 200

4 PIR sensor 1 250

5 Camera module 1 300

6 Printing and Stationary pages 200 300

7 Mobile Airtime - - 500


Total 5250

xiv | P a g e
References

[1] U. Sirisha, D. PoojaSri, N. Gayathri, K. Heshma and S. G. Raja, “IOT based anti-theft
detection and alerting system using Raspberry Pi,” International Research Journal of
Engineering and Technology (IRJET), vol. 07, no. 03, March 2020.
[2] S. Pandya, H. Ghayvat, K. Kotecha, M. H. Yep and P. Gope, “A Novel Approach for
Near Real-Time Monitoring, Smart Home Security and Large Video Data Handling for
Wellness Protocol,” Applied System Innovation, vol. 01, no. 42, 11 July 2018.
[3] S. Kute, R. Pimpalkar, V. More and M. Gorbal, “Theft Detection System,” ICONIC
RESEARCH AND ENGINEERING Journals, vol. 4, no. 10, April 2021.
[4] H. Woo, Y. M. Jung, J.-G. Kim and J. K. Seo, “Environmentally Robust Motion
Detection for Video Surveillance,” IEEE TRANSACTIONS ON IMAGE PROCESSING,
vol. 19, no. 11, November 2010.

xv | P a g e

You might also like