0% found this document useful (0 votes)
4 views51 pages

Downloadfile

The document outlines a project focused on developing an Anti-Theft Vehicle Control System using an ESP32-CAM and Arduino Nano microcontroller. The system aims to enhance vehicle security by capturing images of unauthorized access attempts and disabling vehicle ignition through a DC motor. It includes detailed descriptions of embedded systems, hardware components, software implementation, and the overall project structure, emphasizing real-time monitoring and alerts for vehicle owners.

Uploaded by

Avula Usha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views51 pages

Downloadfile

The document outlines a project focused on developing an Anti-Theft Vehicle Control System using an ESP32-CAM and Arduino Nano microcontroller. The system aims to enhance vehicle security by capturing images of unauthorized access attempts and disabling vehicle ignition through a DC motor. It includes detailed descriptions of embedded systems, hardware components, software implementation, and the overall project structure, emphasizing real-time monitoring and alerts for vehicle owners.

Uploaded by

Avula Usha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 51

CONTENTS

DESCRIPTION PAGE NO.

LIST OF FIGURES…………………………………………………………. 1

ABSTRACT………………………………………………………………….2

1. INTRODUCTION

1.1 Introduction……………………………………………………………3

1.2 Project Overview………………………...…………………………….4

2. EMBEDDED SYSTEMS

2.1 Introduction to embedded systems…………………...………………..6

2.2 Need of embedded systems……………………...…………………….9

2.3 Explanation of embedded systems…………………………………....11

3. HARDWARE DESCRIPTION

3.1 Introduction with block diagram………………………………….… 15

3.2 Arduino Nano ………………………………………………….…,…16

3.3 Regulated power supply……….………………...…………….……..17

3.4 LED…………………………………………………………………..18

3.5 Keypad………………………………………………………….……19

3.6 DC motor….…………………………………………………….…...21

3.7 Buzzer………………………………………………………………..23

3.8 ESP32 camera………...……………………………………………...24

1
4. SOFTWARE DESCRIPTION

4.1 Arduino IDE Compiler…………………………………………….....31

4.2 Procedural steps for compilation, simulation and dumping…….…....32

4.3 Program………………………………………………………………36

5. PROJECT DESCRIPTION………..……………………………………41

6. ADVANTAGES, DISADVANTAGES AND APPLICATIONS………...45

7. RESULTS…………………………………………………………………

8. CONCLUSION & FUTURPROSPECTS……….……………………….

9. REFERENCES…………………………………………………………50

2
LIST OF FIGURES

FIGURE NO. DESCRIPTION PAGE NO.

Fig.2.1 Modern example of embedded system…………………………..8

Fig.2.2 Network communication embedded system…………………….14

Fig.3.1 Block diagram…………………………………………………...16

Fig.3.2 Arduino nano…………………………………………………….17

Fig.3.3 Power Supply……………………………………………………18

Fig.3.4 LED……………………………………………………………..19

Fig.3.5 Parts of LED……………………………………………………..19

Fig.3.6 Electrical symbol and Polarities of LED………………………...20

Fig.3.7 4x4 Key Pad………………………………………………..........21

Fig.3.8 Key Pad connection to microcontroller…………………………22

Fig.3.9 Connection of Key Pad………………………………………….23

Fig.3.10 Interfacing Key Pad with PIC16F877A………………………..24

Fig.3.11 ESP32 Camera………………………………………………….25

Fig.3.12 DC Motor………………………………………………………27

Fig.3.13 Simple electrical diagram of DC Motor………………………..28

Fig.3.14 Operation of DC Motor………………………………………...29

Fig.3.15 Buzzer………………………………
3
CHAPTER-1

INTRODUCTION
1.1 Introduction
Currently almost of the public having an own vehicle, theft is happening on parking and
sometimes driving insecurity places. The safe of vehicles is extremely essential for public
vehicles. Vehicle theft is a growing concern in urban and rural areas, necessitating the
development of smart, affordable, and reliable security systems. This project presents an
AntiTheft Vehicle Control System utilizing the ESP32-CAM, a low-cost Arduino NANO
microcontroller with built-in Wi-Fi and ESP32-camera module. The system is designed to
monitor and respond to unauthorized access attempts by capturing real-time images and
disabling vehicle operation. The core functionality includes intrusion detection using
keypad. Upon detecting suspicious activity when wrong password entered through keypad,
the ESP32-CAM captures an image of the intruder via Wi-Fi to the vehicle owner's mobile
device through email services. Additionally, the system employs a DC motor to disable the
vehicle's ignition control, thereby preventing theft. The system operates autonomously and
can be remotely controlled or monitored via a web interface or mobile application. This
solution offers a compact, cost-effective, and intelligent approach to vehicle security,
combining surveillance, alerting, and control the vehicle automatically.
The main controlling device of the project is Arduino Nano microcontroller. Transistor with
ignition DC motor is interfacing to the Arduino. The main controlling device of the project
is Arduino Nano Microcontroller to achieve this task. Keypad is used for intruder detection
based on entry of wrong password. DC motor works as vehicle for ignition. The system
provides both audible and visual alerts using buzzer alarm and visual alerts buzzer alarm
and ESP32 camera
based email alerts with photo capture of the intruder.

4
1.2 Project overview

The project “ANTI THEFT VEHICLE CONTROL WITH PHOTO CAPTURE


USING ESP32 CAMERA” that controls the vehicle ignition automatically when the
intruder enters wrong password by sending the intruder photo to the owner email address
using ESP32 camera.

Anti-Theft Vehicle with Photo Capture system is designed to enhance vehicle security by
capturing images of potential thieves or unauthorized individuals attempting to access the
vehicle. This system integrates advanced technologies such as cameras, sensors, and GPS
to provide real-time monitoring and alerts.

Key Features:

1. Image Capture: The system captures images of individuals attempting to access the
vehicle without authorization.

2.Real-time Alerts: The system sends real-time alerts to the vehicle owner or authorities
in case of unauthorized access.

3.GPS Tracking: The system tracks the vehicle's location in real-time, enabling recovery
in case of theft.

4.Motion Detection: The system detects motion around the vehicle and triggers alerts or
image capture accordingly.

Objectives:

1.Enhanced Security: Provide an additional layer of security for vehicles to prevent theft
and unauthorized access.

2.Evidence Collection: Capture images of potential thieves or unauthorized individuals to


aid in investigation and prosecution.

3.Real-time Monitoring: Enable real-time monitoring of the vehicle to respond promptly


to potential security breaches.

5
1.3 Organization of the Report

The contention explains the implementation of “ANTI THEFT VEHICLE CONTROL


WITH PHOTO CAPTURE USING ESP32 CAMERA”. The organization of the thesis is
explained here with:

Chapter 1 Presents introduction to the overall thesis and the overview of the project. In
the project overview a brief introduction of “ANTI THEFT VEHICLE CONTROL WITH
PHOTO CAPTURE USING ESP32 CAMERA” and its applications are discussed.

Chapter 2 Presents the topic embedded systems. It explains the about what is embedded
systems, need for embedded systems, explanation of it along with its applications.

Chapter 3 Presents the hardware description. It deals with the block diagram of the project
and explains the purpose of each block. In the same chapter the explanation of each module
are considered.

Chapter 4 Presents the software description. It explains the implementation of the project
using Arduino IDE Compiler software.

Chapter 5 presents the project description along with each module is


considered.

Chapter 6 Presents the advantages, disadvantages and applications of the


project.

Chapter 7 Presents the results, conclusion and future scope of the project.

6
CHAPTER -2
EMBEDDED SYSTEMS

2.1 Embedded Systems

An embedded system is a computer system designed to perform one or a few dedicated


functions often with real-time computing constraints. It is embedded as part of a complete
device often including hardware and mechanical parts. By contrast, a general-purpose
computer, such as a personal computer (PC), is designed to be flexible and to meet a wide
range of end-user needs. Embedded systems control many devices in common use today.
Embedded systems are controlled by one or more main processing cores that are typically
either microcontrollers or digital signal processors (DSP). The keycharacteristic, however,
is being dedicated to handle a particular task, which may require very powerful processors.
For example, air traffic control systems may usefully be viewed as embedded, even though
they involve mainframe computers and dedicated regional and national networks between
airports and radar sites. (Each radar probably includes one or more embedded systems of
its own). Since the embedded system is dedicated to specific tasks, design engineers can
optimize it to reduce the size and cost of the product and increase the reliability and
performance. Some embedded systems are mass-produced, benefiting from economies of
scale. Physically embedded systems range from portable devices such as digital watches
and MP3 players, to large stationary installations like traffic lights, factory controllers, or
the systems controlling nuclear power plants. Complexity varies from low, with a single
microcontroller chip, to very high with multiple units, peripherals and networks mounted
inside a large chassis or enclosure. In general, "embedded system" is not a strictly
definable term, as most systems have some element of extensibility or programmability.
For example, handheld computers share some elements with embedded systems such as
the operating systems and microprocessors which power them, but they allow different
applications to be loaded and peripherals to be connected. Moreover, even systems which
don't expose programmability as a primary feature generally need to support software
updates. On a continuum from "general purpose" to "embedded", large application systems
will have subcomponents at most points even if the system as a whole is "designed to

7
perform one or a few dedicated functions", and is thus appropriate to call "embedded". A
modern example of embedded system is shown in fig: 2.1.

Fig 2.1:A modern example of embedded system

8
CHAPTER -3
HARDWARE COMPONENTS

3.1 Introduction

In this chapter the block diagram of the project and design aspect of independent modules
are considered. Block diagram is shown in fig: 3.1

Fig.3.1: Block diagram of ANTI THEFT VEHICLE CONTROL WITH PHOTO

CAPTURE USING ESP32 CAMERA

9
The main blocks of this project are:
1. Adapter power supply.

2. Arduino Nano Micro controller.

3. ESP32 camera.

4. Keypad.

5. DC motor.

6. Buzzer.

7. LED indicators.

3.2 ARDUINO :

Fig: 3.2 Arduino Nano

3.2.1 Introduction to Microcontrollers:


Arduino Nano is a small size board and also flexible with a wide variety of applications.
This is good product for fast and small prototype. Arduino is an open-source hardware
and software company, project and user community that designs and manufactures single-
board microcontrollers and microcontroller kits for building digital devices. Arduino
Nano is based on the ATmega328 SMD chip. It has 14 digital input/output pins (of which
6 can be used as PWM outputs), 8 analog inputs, 1 UARTs (hardware serial ports), a 16
MHz crystal oscillator, a USB connection, and a reset button.

10
ARDUINO NANO SPECIFICATIONS

Microcontroller Atmel ATmega328 SMD Package

Operating voltage (logic level) 5V

Input voltage (recommended) 7-12 V

Digital I/O Pins 14 (of which 6 provide PWM output)

Analog Input Pins 8

DC Current fot I/O Pins 40 mA

Flash Memory 32 KB (of which 2KB used by bootloader)

SRAM 2 KB

EEPROM 1 KB

Clock Speed 16 MHz

3.3 KEYPAD:

A keypad is a set of buttons arranged in a block or "pad" which usually bear digits another
symbols and usually a complete set of alphabetical letters. If it mostly contains numbers
then it can also be called a numeric keypad. Keypads are found on many alphanumeric
keyboards and on other devices such as calculators, push-button telephones, combination
locks, and digital door locks, which require mainly numeric input.
Keypads are also a feature of some combination locks. This type of lock is often used on
doors, such as that found at the main entrance to some offices.

11
Fig.3.7:4x4 Keypad
Keypad is an array of switch. There will be 2 wires connected each time a button is pressed.
For example; when button ‘1’ is pressed, pin col1 and row1 is connected. There is no
connection between rows and also columns. The button makes it connect. To scan which
button is pressed, users need to scan it column by column and row by row. Make rows as
input and columns as output. For example; set all columns by default. 1st scan, clear (logic
low) column 1 and scan row1-row4 low logic, this will determine which button is pressed
in column1. If one of those buttons is pressed, record it and jump out from the scanning
loop and continue with the action required. If none button is pressed in column1, set it back
to default (logic high) and clear column2. Scan row1-row4 again and this will scan button
press of ‘2’, ‘5’, ‘8’ and ‘0’. And this process is being repeated until all four columns being
completed scanned. For keypad wiring, keypads pins need to pull up or pull down to avoid
floating case happen. Pull up normally connect to 5V and pull down is connect to ground.

4x4 Keypad pin can directly connect to microcontroller or keypad decoder IC for decodes
purpose. However, DIY scanning of keypad consumes a lot of understanding in
programming and more program space. The better way to interface a keypad to the PIC is
to use a keypad encoder in between the keypad and the microcontroller. One of the Keypad
Encoder is the MMC74C922. Simply hook up all the row and the column pins directly to
the encoder and it will output a HIGH pulse on the Data Available pin whenever a key is
pressed. After that, the encoder will output 4 bits of data to the PIC. Please refer
MMC74C922 datasheet for more information.

12
Below is example keypad which connects directly to a PIC microcontroller. This
16-button keypad provides a useful human interface component for
microcontroller projects. Convenient adhesive backing provides a simple way
to mount the keypad in a variety of applications. Working process of
Keypad
Matrix keypads use a combination of four rows and four columns to provide
button states to the host device, typically a microcontroller. Underneath each key
is a pushbutton, with one end connected to one row, and the other end connected
to one column.

These connections are shown in Figure

13
Fig.3.8: connection of keypad

In order for the microcontroller to determine which button is pressed, it first


needs to pull each of the four columns (pins 1-4) either low or high one at a
time, and then poll the states of the four rows (pins 5-8). Depending on the
states of the columns, the microcontroller can tell which button is pressed.

For example, say your program pulls all four columns low and then pulls the

first row high. It then reads the input states of each column, and reads pin 1

high. This means that a contact has been made between column 4 and row 1,

so button ‘A’ has been pressed.

Matrix Keypad interfacing with PIC microcontroller


Matrix keypads are very useful when designing certain systems which needs
user input. These keypads are constructed by arranging push button switches
in rows and columns as shown in Fig.1. Scanning keypad to detect pressed
keys involves several steps and there are several methods to achieve this. The
method presented here is capable of detecting more that one key press at time
14
and encode that information in single 16bit (unsigned int) variable. For
example this keypad scan routine can be used to detect key presses like
CTRL+C in computer keypads.

Interfacing keypad with PIC16F877A

We now want to scan a keypad in PIC16F/18F Slicker Board. In case of 4X4


matrix Keypad both the ends of switches are connected to the port pin i.e. four
rows and four columns. So in all sixteen switches have been interfaced using
just eight lines.1Keypads arranged by matrix format, each row and column
section pulled by high or low by selection J15, all row lines(PORTB.0 –
PORTB.3) and column lines(PORTB.4 to PORTB.7) connected directly by the
port pins.4 X 4 matrix keypad to two ports in microcontroller. The rows are
connected to an output port and the
columns are connected to an input port.

Fig.3.9: Interfacing keypad with PIC16F877A


To detect a pressed key, the microcontroller grounds all rows by providing 0
to the output latch, and then it reads the columns. If the data read from the
columns is D3-D0=1111, no key has been pressed and the process continues
15
until a key press is detected. However, if one of the column bits has a zero, this
means that a key press has occurred.

Features

1. Ultra-thin design.

2. Excellent price/performance ratio. 3. Easy interface to any


microcontroller.

Key Specifications

1. Maximum rating: 24 VDC, 30 mA.

2. Life Expectancy: 1 million closures.

3. Bounce time: ≤5 ms.

4. Insulation Resistance: 100M Omh, @ 100V.

5. Dielectric Withstand: 250VRms (@ 60Hz, 1min).

6. Interface: 8-pin access to 4x4 matrix.

7. Operating temperature: 32 to 122 °F (0 to 50°C).

Applications

1.Security

2.Menu selection

3.Data entry for embedded systems

16
3.6 ESP32 camera:

Fig 3.10: ESP-32Cam

ESP32 Feature:

1. ESP32-CAM :.

2. The smallest 802.11b/g/n Wi-Fi BT SoC module.

3. Low power 32-bit CPU, can also serve the application processor.

4. Up to 160MHz clock speed, summary computing power up to 600


DMIPS.

5. Built-in 520 KB SRAM, external 4MPSRAM.

6. Supports UART/SPI/I2C/PWM/ADC/DAC.

7. Support OV2640 and OV7670 cameras, built-in flash lamp.

8. Support image Wi-Fi upload.

9. Supports TF card.

10. Supports multiple sleep modes.


17
11. Embedded Lwip and Free RTOS.
12. Supports STA/AP/STA+AP operation mode.

13. Support Smart Config/AirKiss technology.

14. Support for serial port local and remote firmware upgrades (FOTA).

Specifications

1. Wireless Module: ESP32-S WiFi 802.11 b/g/n + Bluetooth 4.2 LE


module with PCB antenna,

u.FL connector, 32Mbit SPI flash, 4MBit PSRAM.

2. External Storage: micro SD card slotup to 4GB.

3. Camera

a. FPC connector.

b. Support for OV2640 (sold with a board) or OV7670 cameras.

4. Expansion: 16x through-holes with UART, SPI, I2C, PWM.

5. Misc: Reset button.

6. Power Supply: 5V via pin header.

7. Power Consumption.

a. Flash LED off: 180mA @ 5V.

8. Dimensions (ESP32): 40 x 27 x 12 (LxWxH) mm.

18
9. Temperature Range: Operating: -20 ~ 85 ; storage: -40 ~ 90 @
<90%RH.
3.7 D.C. Motor

A dc motor uses electrical energy to produce mechanical energy, very typically through
the interaction of magnetic fields and current-carrying conductors. The reverse process,
producing electrical energy from mechanical energy, is accomplished by an alternator,
generator or dynamo. Many types of electric motors can be run as generators, and vice
versa.

Fig 3.11: DC Motor


The DC motor has two basic parts: the rotating part that is called the armature and
the stationary part that includes coils of wire called the field coils. The stationary
part is also called the stator. Figure shows a picture of a typical DC motor, Figure
shows a picture of a DC armature, and Fig shows a picture of a typical stator. From
the picture you can see the armature is made of coils of wire wrapped around the
core, and the core has an extended shaft that rotates on bearings. You should also
notice that the ends of each coil of wire on the armature are terminated at one end of
the armature. The termination points are called the commutator, and this is where the
brushes make electrical contact to bring electrical current from the stationary part to
the rotating part of the machine.

Operation

The DC motor you will find in modem industrial applications operates very similarly to the
simple DC motor described earlier in this chapter. Figure 12-9 shows an electrical diagram of
a simple DC motor. Notice that the DC voltage is applied directly to the field winding and
19
the brushes. The armature and the field are both shown as a coil of wire. In later diagrams, a
field resistor will be added in series with the field to control the motor speed.
When voltage is applied to the motor, current begins to flow through the field coil
from the negative terminal to the positive terminal. This sets up a strong magnetic
field in the field winding. Current also begins to flow through the brushes into a
commutator segment and then through an armature coil. The current continues to
flow through the coil back to the brush that is attached to other end of the coil and
returns to the DC power source. The current flowing in the armature coil sets up
a strong
magnetic field in the armature.

Fig 3.12: Simple electrical diagram of DC motor

Fig 3.13: Operation of a DC Motor


The magnetic field in the armature and field coil causes the armature to begin
to rotate. This occurs by the unlike magnetic poles attracting each other and
the like magnetic poles repelling each other. As the armature begins to rotate,
the commutator segments will also begin to move under the brushes. As an
20
individual commutator segment moves under the brush connected to positive
voltage, it will become positive, and when it moves under a brush connected
to negative voltage it will become negative. In this way, the commutator
segments continually change polarity from positive to negative. Since the
commutator segments are connected to the ends of the wires that make up the
field winding in the armature, it causes the magnetic field in the armature to
change polarity continually from north pole to south pole. The commutator
segments and brushes are aligned in such a way that the switch in polarity of
the armature coincides with the location of the armature's magnetic field and
the field winding's magnetic field. The switching action is timed so that the
armature will not lock up magnetically with the field. Instead the magnetic
fields tend to build on each other and provide additional torque to keep the
motor shaft rotating.

When the voltage is de-energized to the motor, the magnetic fields in the
armature and the field winding will quickly diminish and the armature shaft's
speed will begin to drop to zero. If voltage is applied to the motor again, the
magnetic fields will strengthen and the armature will begin to rotate again.

Applications of DC Motors:

1. Electric Train: A kind of DC motor called the DC Series Motor is used in


Electric Trains. The DC Series Motors have the property to deliver more
power when they are loaded more. So the more the people get on a train, the
more powerful the train becomes.

2. Elevators: The best bidirectional motors are DC motors. They are used in

elevators. Compound DC Motors are used for this application.

21
3. PC Fans, CD ROM Drives, and Hard Drives: All these things need motors,

very miniature motors, with great precision. AC motors can never imagine

any application in these places.

4. Starter Motors in Automobiles: An automobile battery supplies DC, so a DC

motor is best suited here. Also, you cannot start an engine with a small sized

AC motor,

5. Electrical Machines Lab in Colleges.


3.8 Buzzer
Basically, the sound source of a piezoelectric sound component is a
piezoelectric diaphragm. A piezoelectric diaphragm consists of a piezoelectric
ceramic plate which has electrodes on both sides and a metal plate (brass or
stainless steel, etc.). A piezoelectric ceramic plate is attached to a metal plate
with adhesives. Applying D.C. voltage between electrodes of a piezoelectric
diaphragm causes mechanical distortion due to the piezoelectric effect. For a
misshaped piezoelectric element, the distortion of the piezoelectric element
expands in a radial direction. And the piezoelectric diaphragm bends toward
the direction. The metal plate bonded to the piezoelectric element does not
expand. Conversely, when the piezoelectric element shrinks, the piezoelectric
diaphragm bends in the direction Thus, when AC voltage is applied across
electrodes, the bending is repeated, producing sound waves in the air. .

If a battery is used as the power supply, it is worth remembering that piezo


sounders draw much less current than buzzers.Buzzers also just have one
‘tone’, whereas a piezo sounder is able to create sounds of many different
tones.

To switch on buzzer -high 1

To switch off buzzer -low 1


22
Notice (Handling) In Using Self Drive Method

Fig.3.14: Buzzer

CHAPTER-4

SOFTWARE DESCRIPTION

This project is implemented using following software’s

: • Arduino IDE compiler - for compilation part

4.1 Arduino IDE Compiler:

This instructable adds to any of the Arduino on a Breadboard instructables.

1. Not all ATmega328’s are equal.


(A bootloader, very simply, is a programme that sits on the chip and manages the upload
of your sketches onto the chip).

2. We need a microcontroller with a pre-loaded Bootloader, or must load your own.

4.2 Procedural steps for compilation, simulation and dumping:

Learn the basics of uploading a sketch in Arduino IDE:

23
1. Open Arduino IDE.

2. Connect the board to your computer.

3. Board package installation.

4. Select board and port.

5. Upload a sketch.

What you’ll need:

1. A computer running Windows, macOS or Linux.

2. Arduino IDE.

3. An Arduino board.

4. A compatible data USB cable.

1.Open Arduino IDE

If you haven’t done so already, download Arduino IDE from the software page.
You can find installation instructions here.

24
1. Connect the board to your computer

Next, connect to board to your computer with a USB cable. This will both
power the board and allow the IDE to send instructions to the board. You’ll
need a data USB cable (a charge-only cable will not work), with connectors
that fit both the board and your computer.

Arduino boards use different USB connectors:

1. USB-B (UNO Rev3, UNO WiFi Rev2, Mega boards)

2. Mini-B USB (Nano)

3. Micro-B (Nano Family boards (except the classic Nano), MKR Family
boards)

4. USB-C (Portenta boards, UNO Mini Limited Edition)


25
The most common USB connector is USB-A, but newer laptop computers may
only have USB-

C.

2.Install board package

To compile and upload sketches for your board Arduino IDE needs a collection of
files for that board called a board package.

When Arduino IDE detects a board with a missing board package, it may ask you
to install the missing files:

• In IDE 2, click Yes.

2. Select board and port

Port and board selection can be managed in two ways:

• Using the board selector (requires IDE 2)

• Using the Tools menu

26
Using the board selector

Follow these steps to use a connected board:

1. Find the board selector and click to open.

2. A list of ports will be displayed. If a board could be identified, the board


name will be displayed, otherwise, it will display “Unknown”.

3.Click on a port to select it.

When you select a board, the following may occur:

1. If it is unknown, the “Select Other board and port” dialog will open. See
Select board and port in Arduino IDE for details.

2. If the board could be identif


27
3. ied, but you are missing the board platform, you may be asked

to install it:

a) Select Yes to automatically install the board package in the background.

b) Select Install manually to view the package in the Board Manager.


To learn more about installing boards, see Add a board to Arduino IDE.

Using the Tools menu Select board:

1. Click on Tools in the menu bar and find the Board row. If a board

is currently selected it will be displayed here.

2. Hover over the Board row to reveal the installed board packages.

These packages contain some popular boards:

28
3. Click on a board to select it.
SELECT PORTS:
1.Click on Tools in the menu bar and find the Port row. If a board is currently
selected it will be displayed here.

5. Upload a sketch

1.Write a sketch, or use an Example such as Blink (File > Examples >
01.Basics > Blink).

2.Optional: Click the Verify button to try compiling the sketch and check
for errors.

3.Click the Upload button to program the board with the sketch.
29
Your sketch will start running on the board. It will run again each time the
board is reset.

Troubleshooting

1. Make sure you’ve followed the steps before, especially selecting the
board and port correctly.

2. If you can’t find your board in the port menu, or if the Tools > Port
port menu is missing, see If your board does not appear in the port
menu.
3. If you get an upload error, see Errors when uploading a sketch.
Program:

#include <Keypad.h> const byte

ROWS = 4; const byte

COLS = 4; char

keys[ROWS][COLS] = {

{'1','2','3','A'},

{'4','5','6','B'},

{'7','8','9','C'},

{'*','0','#','D'}

}; byte row Pins [ROWS] = {2, 3, 4, 5}; // Connect to R1, R2, R3,

R4 byte col Pins [COLS] = {6, 7, 8, 9}; // Connect to C1,

C2, C3,
30
C4

Keypad key pad = Keypad (make Keymap(keys), row Pins, col Pins, ROWS,
COLS);

String correct Password = "*1"; String

input = ""; int flag

= 0; int wrong

Attempts = 0;

const int relay

Pin = 10; const int

buzzer Pin = 13;

void setup () {

pin Mode (relay

Pin,

OUTPUT); pin Mode (buzzer Pin,

OUTPUT); digital Write (relay

Pin, LOW);

Serial. begin(9600);

Digital Write (buzzer Pin, HIGH);

31
Delay (500);

Digital Write (buzzer Pin, LOW);

Delay (500);

Digital Write (buzzer Pin, HIGH);

Delay (500);

Digital Write (buzzer Pin, LOW);

Delay (500);

} void loop () { char key = keypad. Get Key (); if (key) {

if (key == '#') { if ((input == correct Password) && (flag==0)) { digital


Write

(relay Pin, HIGH); // Correct password → turn ON relay wrong

Attempts = 0; flag=1;
}

else if ((input == correct Password) && (flag==1))

Digital Write (relay Pin, LOW); // Correct password → turn OFF relay

Wrong Attempts = 0;

flag=0;

32
} else

Wrong Attempts++;

Buzz (); if (wrong Attempts

>= 3) {

Serial.

Print ln ("A");

Digital Write (buzzer Pin, HIGH);

Delay (5000);

Digital Write (buzzer Pin, LOW);

} input = ""; // Clear input after pressing


'#'

} else { input += key; // Keep building password

Delay (50);

33
void buzz ()

Digital Write (buzzer Pin, HIGH);

Delay (250);

Digital Write (buzzer Pin, LOW);

Delay (250);

Digital Write (buzzer Pin, HIGH);

Delay (250);

Digital Write (buzzer Pin, LOW);

Delay (250);

34
CHAPTER- 5

PROJECT DESCRIPTION
In this chapter, schematic diagram and interfacing of ARDUINO NANO with each module
is considered.

35
Fig 5.1: schematic diagram of ANTI THEFT VEHICLE CONTROL WITH
PHOTO

CAPTURE USING ESP32 CAMERA

The above schematic diagram of ANTI THEFT VEHICLE CONTROL WITH PHOTO
CAPTURE
USING ESP32 CAMERA explains the interfacing section of each component with micro
controller, ESP

32 camera, buzzer, Dc motor.

KIT IN THE INITIAL POSITION :

36
Anti-Theft Vehicle Control with Photo Capture using ESP32 Camera
This project aims to design and develop a vehicle security system that
uses an ESP32 microcontroller and camera module to capture photos of
intruders who attempt to access the vehicle with an incorrect password.
The system controls the vehicle ignition, preventing unauthorized access,
and sends the captured photo to the owner's email address.

Key Components

1. ESP32 Microcontroller: The core component that processes inputs, controls

outputs, and connects to the internet.

2. ESP32 Camera Module: Captures photos of intruders and sends them to the
owner's email.

3. Ignition Control System: Interfaces with the vehicle's ignition system to


prevent unauthorized access.

37
STEP 1: SWITCHING ON THE PERSONAL HOTSPOT :

STEP 2:CONNECTING TO ESP-32CAMERA :

38
System Functionality
1. Password Authentication: The system prompts users to enter a password to
access the vehicle.

2. Intruder Detection: If an incorrect password is entered, the system captures

a photo of the intruder and sends it to the owner's email.

3. Ignition Control: The system prevents the vehicle from starting if an


incorrect password is entered.

Goals and Objectives


1. Enhance Vehicle Security: Prevent theft and unauthorized access to
vehicles.

2. Provide Visual Evidence: Capture photos of intruders to aid in identification


and prosecution.

3. Remote Monitoring: Enable vehicle owners to remotely monitor their

vehicles and receive notifications in case of suspicious activity.

Potential Impact

1. Reduced Vehicle Theft: The system can help reduce vehicle theft by

preventing unauthorized access.

2. Improved Security: The system provides an additional layer of security for

vehicles, enhancing overall safety.

3. Increased Owner Peace of Mind: Vehicle owners can have peace of mind

knowing their vehicles are secure and monitored.

39
CHAPTER-5
ADVANTAGES AND DISADVANTAGES
Advantages:
1. Highly efficient and user-friendly design.

2. Easy to operate.

3. Low power consumption.

4. Automatic vehicle ignition control system.

5. Enhanced Vehicle Security


Automatically captures images and disables the vehicle during unauthorized

access attempts, reducing the risk of theft.

6. Real-Time Photo Capture


Provides visual evidence of the intruder through the ESP32-CAM, which can

be stored or sent to the owner's device.

40
7. Cost-Effective Solution
Utilizes affordable components like the ESP32-CAM, relay modules, and
basic sensors.

8. Low Power Consumption


Designed to operate efficiently with minimal power, suitable for continuous

monitoring without draining the vehicle battery.

9. Instant Alerts
Sends immediate notifications to the user via email, or messaging platforms,

allowing quick response and action.

10. Scalable & Extendable


Can be upgraded with additional features like voice alerts, facial recognition,

cloud storage, or integration with smart home/IoT systems.

Disadvantages:
1. Power Dependency
Requires continuous power supply; prolonged inactivity or battery drain can

disable the system’s functionality.

2. Image Quality in Low Light


ESP32-CAM has limited low-light performance without additional infrared
LEDs or external

lighting.

3. Security Risks
If not properly secured, the system could be vulnerable to hacking, especially

if connected to an open Wi-Fi network.

4. Wi-Fi Disconnections
Intermittent Wi-Fi connections can delay image uploads or alerts, especially in

mobile or unstable environments.


41
5. Limited AI/Processing Power
ESP32-CAM has limited processing capacity for advanced features like facial

recognition or video recording.

6. Requires Technical Knowledge


Installation and maintenance require basic electronics and programming skills,

which might be a barrier for general users.

Applications:

1. VIP vehicle tracking.

2. Child and animal tracking.

3. Vehicle Security Applications.

4. Ambulance tracking.
5. This system is used for all type of two wheelers and four wheelers.

6. Personal Vehicle Security

Provides real-time monitoring and theft prevention for private cars,


bikes, or scooters.

7. Fleet Management
Ensures security of commercial vehicles (taxis, delivery vans,

transport trucks) by capturing intrusion attempts and tracking vehicle

location.

8. Smart Parking Systems


Used in parking lots to monitor unauthorized access or suspicious
activity in parked vehicles.

42
9. Two-Wheeler Anti-Theft
Compact size makes it ideal for bikes and scooters to alert owners and

disable the vehicle when tampered with.

10. Workshop & Showroom Vehicle Monitoring


Helps in monitoring test-drive vehicles or parked inventory in
showrooms and service centers.

11. Home Garage Security

Acts as a smart garage camera and vehicle lock system, integrated into
home security setups.

12. Police & Military Use


Deployed in law enforcement or military vehicles for enhanced
surveillance and tamper alerts.

13. Emergency & Ambulance Vehicle Safety


Prevents misuse of emergency vehicles by unauthorized individuals
when parked or unattended.

14. Travel & Tourism Vehicles


Useful in tour buses or rental cars to monitor and secure them when
parked in unknown areas.

43
CHAPTER-6
TESTING & RESULTS

6.1 Result:
The project “ANTI THEFT VEHICLE CONTROL WITH PHOTO CAPTURE
USING ESP32

CAMERA” was designed a vehicle theft an Anti-Theft Vehicle Control System


utilizing the ESP32- CAM, a lowcost Arduino NANO microcontroller with built-in
Wi-Fi and a ESP32 camera module. The system is designed to monitor and respond to
unauthorized access attempts by capturing real-time images and disabling vehicle
operation.

CASE 1: WHEN THE CORRECT PASSWORD IS ENTERED ON THE KEYPAD ,THE


ENGINE GETS STARTED

44
CASE 2:WHEN AN UNAUTHORIZED ACCESS IS DETECTED,FOR 3 TIMES THE
CAMERA TENDS TO CAPTURE THE IMAGE.

When an unauthorized attempt of the intruder is detected,for the third attempt the buzzer
will alert and tries to capture the image .The captured image will be sent to the mail.The
sample captured images are as follows:

45
CHAPTER-7

CONCLUSION AND FUTURE SCOPE


7.1 Conclusion:
Integrating features of all the hardware components used have been
developed in it. Presence of every module has been reasoned out and placed
carefully, thus contributing to the best working of the unit. Secondly, using
highly advanced IC’s with the help of growing technology, the project has been
successfully implemented. Thus the project has been successfully designed
and tested. The Anti-Theft Vehicle with Photo Capture system is a cutting-edge
solution that leverages advanced technologies to provide unparalleled security
for vehicles. By capturing images of potential thieves, sending real-time alerts,
and tracking vehicle locations, this system significantly reduces the risk of
theft and enhances recovery rates. Its effectiveness in deterring theft, aiding
investigations, and providing valuable evidence makes it an indispensable tool
46
for vehicle owners, law enforcement, and security professionals. As
technology continues to evolve, such innovative solutions play a crucial role
in safeguarding assets and ensuring public safety. The Anti-Theft Vehicle with
Photo Capture system offers a robust solution for enhancing vehicle security.
By integrating advanced technologies like cameras, GPS, and motion
detection, it provides real-time monitoring, alerts, and evidence collection.
This system can effectively deter theft, aid in recovery, and support
investigations, making it a valuable asset for vehicle owners and authorities
alike.

7.2 Future Scope:

1. By using this project, we can save the time and for vehicle tracking it is very
easy.

2. By interfacing MMC/SD card to the system we can log the path of the
vehicle being traveled.

3. Advanced GPS Tracking


Enable live tracking with geofencing to alert the user if the vehicle moves
outside a predefined area.

4. Multi-Level Authentication
Add biometric/fingerprint authentication or RFID-based access to
unlock or start the vehicle.

5. Solar-Powered System
Implement solar panels for power backup, enabling uninterrupted 24/7
operation even when the vehicle is parked for long durations.

47
6. Smart Auto-Lock Mechanism
Integrate with central locking systems to automatically lock the vehicle
if intrusion is detected.

7. Voice-Based Alerts
Use a speaker module (e.g., DFPlayer Mini) to play pre-recorded
warning messages )

48
[1] Asaad M. J. Al-Hindawi, Ibraheem Talib,

“Experimentally Evaluation of System”, International Journal of Computer

GPS/GSM Based System Design”, Science & Information Technology (IJCSIT) Vol

Journal of Electronic 4, No 2, April 2012.

Systems Volume 2 Number 2 June Kai-Tai Song, Chih-Chieh Yang, of


2012
National Chiao Tung University, Taiwan,
[2] Kunal Maurya , Mandeep Singh, Neelu Jain,
“Front Vehicle Tracking Using Scene
“Real Time Vehicle Tracking System using
Analysis”, Proceedings of the IEEE
International
GSM and GPS Technology- An Anti-
Conference on Mechatronics & Automation
2005.
theft

Tracking System,” International Journal of


[5] Chen Peijiang, Jiang Xuehua, “Design
and
Electronics and Computer Science Engineering.
Implementation of Remote monitoring
system
ISSN 2277- 1956/V1N3-1103-1107 based on GSM,” vol.42, pp.167-175.

2008.
[3] Vikram Kulkarni & Viswaprakash Babu,
“embedded smart car security system on face
[6] Albert Alexe, R.Ezhilarasie, “Cloud
detection’, special issue of IJCCT,
Computing Based Vehicle Tracking
ISSN(Online):2231-0371, ISSN(Print):0975-
Information Systems”, ISSN: 2229 - 4333 (
Print)
7449,volume-3, issue-1
| ISSN: 0976 - 8491 (Online ) IJCST Vol.

2, Iss ue 1, March 2011


[4] V.Ramya, B. Palaniappan, K. Karthick,

“Embedded Controller for Vehicle In-Front


[7] R.Ramani, S.Selvaraju,
Obstacle Detection and Cabin Safety Alert
S.Valarmathy,

R.Thangam B.Rajasekaran, “water-level

monitor for bore well and water tank based on


48
GSM”, International Journal of engineering

science and technology (IJEST), ISSN: 0975-

5462, volume4-N0:10, october2012

You might also like