CFP last date
20 January 2025
Reseach Article

Security System for Vehicle using Number Plate Detection and RFID

by Paras Goyal, Iqbal Singh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 97 - Number 8
Year of Publication: 2014
Authors: Paras Goyal, Iqbal Singh
10.5120/17031-7332

Paras Goyal, Iqbal Singh . Security System for Vehicle using Number Plate Detection and RFID. International Journal of Computer Applications. 97, 8 ( July 2014), 42-44. DOI=10.5120/17031-7332

@article{ 10.5120/17031-7332,
author = { Paras Goyal, Iqbal Singh },
title = { Security System for Vehicle using Number Plate Detection and RFID },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 97 },
number = { 8 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-44 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume97/number8/17031-7332/ },
doi = { 10.5120/17031-7332 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:23:36.841481+05:30
%A Paras Goyal
%A Iqbal Singh
%T Security System for Vehicle using Number Plate Detection and RFID
%J International Journal of Computer Applications
%@ 0975-8887
%V 97
%N 8
%P 42-44
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, vehicle number plate is captured by the camera. And then it compare with the database that is made in the MATLAB. During comparing it uses a edge detection and compares pixel to pixel templates that are already define in the program. And after matching the number plate it request for the RFID card. For this RF receiver is also interface with it and when RFID card is sweep on the RF receiver it detect its ID and match with the ID that is already stored in the database. Radio frequency identification (RFID), is a generic term for technology that radio waves is used to identify people automatically and objects. If the ID and the number are matches with the database then it show the message "authorized person" else "unauthorized person". Both should be match with the database. If single one condition is true then it shows "unauthorized person". The objective is to design an efficient automatic authorized vehicle identification system by using the vehicle number plate. The developed system firstly detects the vehicle and then it capture the vehicle number plate. And Vehicle number plate is extracted by using the image segmentation and Optical character recognition technique which is used for the recognizing the character. and then resulting data is used to compare with the records on a database and data extracted from RFID. And in database there can be specific information like vehicle's owner name, place of registration, or address, etc.

References
  1. Optasia Systems Pte Ltd, "The World Leader in License Plate Recognition Technology" Sourced from:www. singaporegateway. com/optasia, Accessed 22 November2008.
  2. J. W. Hsieh, S. H. Yu, and Y. S. Chen. Morphology "Based license plate detection from complex scenes" 16th International Conference on Pattern Recognition (ICPR'02), pp. 79–179, 2002.
  3. V. Kasmat, and S. Ganesan, "An efficient Implementation of the Hough transform for detecting Vehicle license plates using DSP's,"IEEE International Conference on Real-Time Technology And Application Symposium, Chicago, USA, pp. 58-59, 2005.
  4. S. H. Park, K. I. Kim, K. Jung and H. J. Kim, "Locating Car license plate using Neural Network," Electronic Letters, Vol. 35, No. 17, pp. 1474.
  5. K. K. KIM, K. I. , KIM, J. B. KIM, and H. J. KIM, "Learning-Based Approach for License Plate Recognition" Proceeding of IEEE Signal Processing Society Workshop, Vol. 2, pp. 614-623, 2000.
  6. RFID Journal. Online publication. Referenced 2005 at http://www. rfidjournal. com
  7. Alien Technology Corporation achieves "Another step Toward Pervasive, economic RFID with announcement Of12. 9 cent RFID labels", 13 September 2005. Alien Technology Press Release. Referenced2005at http://www. alientechnology. com.
  8. Boycott Benetton web site, 2005. Referenced 2005 at http://www. boycottbenetton. com
  9. ECRYPT ("European network for excellence in Cryptology"), stream cipher project Web page, 2005.
  10. Texas Instruments gen 2 inlay data sheet, 2005. Referenced 2005 at http://www. ti. com/rfid/docs/manuals/pdfSpecs/epcinlay. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

MATLAB RFID