SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 620
Mobile Theft Tracking Application
Prof. Kishore N. Shedge 1, Dnyaneshwar C. Dhatrak2, Kanchan S. Ugale3,
Asmita P. Walimbe4, Anil S. Khade5
1 ME (Computer), S.V.I.T, Chincholi, Nasik, Maharashtra – 422102.
2345 B.E (Computer), S.V.I.T, Chincholi, Nasik, Maharashtra – 422102.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract- This project aims to find stolen or lost phone
with the help of different GPS location, IMEI
(InternationalMobileEquipmentIdentity) Numberofphone.
When the application is install it will work in
background. This application stores the uniqueuserid&
password, SIM Number, alternative phone number, E-
mail id, whats app number, phones current location.
When phone is stolen or loss user will get the images
which are capture by front camera, GPS location on
alternative phone number & also on given mail id, with
the help of these information we can easily find out
phone & the person who has stolen the smartphone.
Key Words: Mobile tracking, sim tracking, latitude and
longitude, user registraction, sms/email/text/whatsapp.
1. INTRODUCTION
Smart phone is a mobile phone which offers
advanced technologies with functionality similar as a
personal computer. With the growing speed of
technological advancement, smart phones have
become the essential components of our daily
performance. These smartphones todaycandoalmost
everything. Faster networking systems, attractive and
powerful applicationsandthetechnologyliterateusers
are making these smart phones very powerful these
days. Smart phone are the best digital devices of
present which provides what a human needs. Today
everyone has a smart phone instead of having a simple
phone which provides features of only doing calls or
text messages but havingasmartphoneisbeneficialby
this we can do our office work on MS Office, can check
our mails any time anywhere and there are a lot of
more things that we can do.
Mobile phone has the personal information. If
the phone is stolen thenthereispossibilityofmisuseof
this information. There may be any personal or
financial problems can be happen. So finding stolen
phone is very important task. There are some
technology and technique available. Using that we can
find out the stolen phone. In India if the phone isstolen
or loss then finding that phone becomes very
complicated process. We need to file a case in police
station and follow a lenghthy procedure. So to make
this process easy and comfortable. Wehavedeveloped
an android application. [2]
In this application we can find the smartphone by the
help of IMEI (International Mobile Equipment
Identity) numbering system, which is a 15 digit
unique code that is used to identify the GSM (Global
System Mobile) phone. This application uses the
latest technology like SMS, Internet (Short Message
Services) through using it you can send thief’s
picture which will be captured using front camera
and current location of the IMEI number. It gives the
exact details about the thief and his/her last location.
If the SIM is changed then the location will be sent to
email id or the alternative number of the user which
is given by user at the time of installation of this
application. [3]
3. METHODOLOGY & RELATED WORK
We have proposed three methods to track location
of the lost smartphone. One is the basic where we get SMS
whenever SIM card is changed, second method is track
GPS location of phone by using google map and the third
method is we capture the images of thief.
3.1 Basic Method
In Basic Method we use SIMuniquenumberfor
identification of authorised user. SIM number is
nothing but the sequence of ten digit numbers. Every
SIM has its own unique number. When the phone is
stolen thief will replace the SIM by its own SIM card
then so the new SIM number will not match with
previous SIM number, this will create an alert message
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 621
and this alert message will be sent to the alternative
number which is registered at the time of installation
of application. With the help of this new number we
can easily find out the location of the smartphone.
3.2 GPS Location
In Second method we can find the location of
phone number. Every phone has unique IMEI number.
And we can easily track this number using GPS system.
A GPS satellite revolves round the earth twice a day in
an orbit and transmit signal data to earth.
When a mobile is lost or stolen then the
application will run andit activatestheGPSandmobile
network. This application sends location to the user
through mail in intervalofoneminute.Theusergoesto
the location and catches the lost phone. Then the users
stop the application by using his password.[6]
3.2 Snapshot of thief
When the phone is stolen thief will replace the
SIM by its own SIM card then so the new SIM number
will not match with previous SIM number, which will
create an alert message and capture some of the
snapshots from frontcameraandsendthose snapshots
to registered alternative number&alsoonuser’semail
id. Using these three methods it is easy to find stolen
phone.
4. SYSTEM ARCHITECTURE
Fig. -1: System Architecture
Above figure shows the architecture & flow of
application. It shows the use of each object.
5. SYSTEM IMPLIMENTATION
Applicaton installation module is used to build
the android application using eclipse environment
with an android developmentkit.Tostarttheemulator
for development of the application. There will be the
emulator to create the new application. There will be
the main module to develop. To create an innovative
android application for anti-theft mobile tracker for
smart phones and to install theapplicationtomobile.It
is used to fetch the real data from user and store into
database using SQL Lite. [2].
In this module first user interface where user
has to provide User Id, Password, SIM, IMEI number,
E-mail ID and alternate number then click submit
button. Next it will store information in the database.
This information is surely protected by encryption.
User can change the alternate number and IEMI
number whenever they want.
5.1 How to open CAMERA Automatically
To do such operation android SDK provides
some libraries or API (Application Program Interface).
Using these API we can operate the camera using
another application. To do this we need to assignsome
camera permission in manifest file.
<uses-permission
android:name=””android.permission.CAMERA”/>
We should also check whether camera is ready
or not and number of available camera. For ex. Front &
rear camera. This can be check by calling following
method
PackageManager.hasSystemFeature() and
Camera.getNumberOfCameras()
To capture Photos and Video Android
framework gives Camera API & CameraIntent. After it
finishes capturing photos it will call onActivityMethod
() where the data gets stored in the SD card.
5.1 How to Send MMS & Email Automatically
As we are going to use SIM & message services
for sending the location and SIM number we need to
assign some permission. To perform such operation
one has to takepermissionbydeclaringinmanifestfile.
MMS is different than SMS. So we have to requestsome
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 622
extra permission. MMS uses private API’s. This API’s
are not provided by android SDK. To send MMS we use
Android GIT repositories. Which it gives internal
permissions to send MMS with any image file.
To send email we have to set permission for
internet services in manifest file to open network
socket for an application.
<uses-permission
android:name=””android.permission.INTERNET”;>
To send email we can also use private API’s
like providing Gmail. In this there are three jar
files mail.jar, activation.jar, additionl.jar which
provides to send email automatically.
7. ADVANTAGES & DISADVANTAGES
7.1 ADVANTAGES
1) You will gate Current location of the thief.
2) User & alternative Number get SMS from new
SIM CARD if it is changed.
3) You will get thief’s pictures
7.2 DISADVANTEGES
1) -Your phone should be connected to internet
2) -Your phone should be GPS System
CONCLUSION
This paper presents an anti theft mobile
tracking application. This application provides strong
security to Smartphone when it is lost or stolen by
thief. It gives the location as well as photos of thief to
user on alternative number and email id provided by
user. With the advent of time, technology is updating
every day. Our application further will be updated and
improved. Currently this applicationworksonandroid
operating system. In future we are trying to make this
application for iOS & windows mobile OS. This will be
our future scope.
ACKNOWLEDGEMENT
We take this opportunity to express ourhearty
thanks to all those who helped us in the completion of
the Paper. We express our deep sense of gratitude to
our Project Guide Prof. K.N. Shedge, Asst. Prof.,
Computer Engineering Department, Sir Visvesvaraya
Institute of Technology, Chincholi for his guidance and
continuous motivation. We gratefullyacknowledgethe
help provided by him on many occasions, for
improvement of this project report with great
interest. We would be failing in ourduties, ifwe do
not express our deep sense of gratitude to Prof. S.
M. Rokade, Head, Computer Engineering
Department for permitting us to avail the facility
and constant encouragement. Lastlywe wouldlike
to thank all the staff members, colleagues, and all
our friends for their help and support fromtime to
time.
9. REFERENCES
1) Smartphone tracking application using short
message service.
2) Anti-Theft Tracking System for Smart Phones by
K. Subha, Dr. S. Sujatha Department of Computer
Application, M.C.A, Anna University, Trichy,
Tamilnadu, India.
3) Mobile Theft Detection with Automatic Location
Tracking By Android Application R.Vignesh Kumar,
S.Venkatesh and G.Nagarajan Department Of
Information Technology, S.K.P.EngineeringCollege,
India
4) Anti-Theft Application for Android Based Devices
by Shweta Dhanu, Afsana Shaikh, Shweta Barshe
Bharati Vidyapeeth College of Engineering, Navi
Mumbai, India.
5) Mobile Tracing Software for Android Phone
Anuradha Sharma1, Jyoti Sharma4,DipeshMonga2,
1Information Technology, College of Technology
and Engineering, Udaipur
6) [6] https://android.googlesource.com/, last
accessed on Aug 06, 2013.
7) An Intelligent Tracking System Based on GSM and
GPS Using Smartphone Vigneshwaran.K 1,
Sumithra.S2, Janani.R3 PG Student (M.E-
Communication Systems),
8) K.S. Kuppusamy1, Senthilraja.R2, G. Aghila3,
MOBILE LOCATION ESTIMATION AND TRACKING
FOR GSM SYSTEMS Vol. 4, Issue 5, June 2015
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 623
9) J.manibharathi,S.Hemalatha, V.Aishwarya,
C.Meenapriya, L.Hepzibha Shekinah Grace,
“Advancement in Mobile Communication using
Android”, International Journal of Computer
Applications (0975 – 8887), Volume 1 – No.7,2010.
10) Chao-Lin Chen; Kai-Ten Feng; "Hybrid Location
Estimationand TrackingSystemforMobileDevices"
IEEE 61st Conference on Vehicular Technology
Volume 4, 2005
11) Kalinin, E. (2012). User needs for location-aware
mobile services. Personal and ubiquitous
computing, 7(1), 70-79
12) Lin, Ding-Bing B.”Mobile location estimation and
tracking for GSM systems” IEEE 15th International
Conference on Personal, Indoor and Mobile Radio
Communications, vol.4, pp.2835-2839

Contenu connexe

Tendances

Arduino Based Home Automation (2003) (1003018)
Arduino Based Home Automation (2003) (1003018)Arduino Based Home Automation (2003) (1003018)
Arduino Based Home Automation (2003) (1003018)
Rappy Saha
 
Rail gate controller ppt
Rail gate controller pptRail gate controller ppt
Rail gate controller ppt
Sajal Das
 

Tendances (20)

Black Box for a Car
Black Box for a CarBlack Box for a Car
Black Box for a Car
 
Quiz application
Quiz applicationQuiz application
Quiz application
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoT
 
A Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe managementA Software Engineering Project on Cyber cafe management
A Software Engineering Project on Cyber cafe management
 
Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"Minor project Report for "Quiz Application"
Minor project Report for "Quiz Application"
 
Mini Project PPT
Mini Project PPTMini Project PPT
Mini Project PPT
 
Arduino Based Home Automation (2003) (1003018)
Arduino Based Home Automation (2003) (1003018)Arduino Based Home Automation (2003) (1003018)
Arduino Based Home Automation (2003) (1003018)
 
Rail gate controller ppt
Rail gate controller pptRail gate controller ppt
Rail gate controller ppt
 
Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]Smart accident detector and intimator [autosaved]
Smart accident detector and intimator [autosaved]
 
Introduction to mobile application
Introduction to mobile applicationIntroduction to mobile application
Introduction to mobile application
 
Windows Phone PPT
Windows Phone PPTWindows Phone PPT
Windows Phone PPT
 
Bank Management System Desktop Application
Bank Management System Desktop Application Bank Management System Desktop Application
Bank Management System Desktop Application
 
Quiz app (android) Documentation
Quiz app (android) DocumentationQuiz app (android) Documentation
Quiz app (android) Documentation
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
A Smart Parking System using Raspberry pi
A Smart Parking System using Raspberry piA Smart Parking System using Raspberry pi
A Smart Parking System using Raspberry pi
 
Home automation ppt
Home automation pptHome automation ppt
Home automation ppt
 
Smart Home technologies
Smart Home technologiesSmart Home technologies
Smart Home technologies
 
Home security
Home securityHome security
Home security
 
ACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEMACCIDENT PREVENTION AND DETECTION SYSTEM
ACCIDENT PREVENTION AND DETECTION SYSTEM
 
SMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOTSMART CAR-PARKING SYSTEM USING IOT
SMART CAR-PARKING SYSTEM USING IOT
 

Similaire à Mobile Theft Tracking Application

Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
IJSRD
 

Similaire à Mobile Theft Tracking Application (20)

Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
 
Implementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification SystemImplementation Of Vehicle Theft Detection and Identification System
Implementation Of Vehicle Theft Detection and Identification System
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on sms
 
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint VerificationAnti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
Anti-Theft Protection of Vehicle by GSM & GPS with Fingerprint Verification
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidMobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
 
IRJET- IoT based Adaptive Traffic Monitoring
IRJET- IoT based Adaptive Traffic MonitoringIRJET- IoT based Adaptive Traffic Monitoring
IRJET- IoT based Adaptive Traffic Monitoring
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft SystemIRJET- Review of Fingerprint based Automobile Anti-Theft System
IRJET- Review of Fingerprint based Automobile Anti-Theft System
 
IRJET- Dynamic Status Tracking & Security System
IRJET- Dynamic Status Tracking & Security SystemIRJET- Dynamic Status Tracking & Security System
IRJET- Dynamic Status Tracking & Security System
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 

Plus de IRJET Journal

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Dernier (20)

Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 

Mobile Theft Tracking Application

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 620 Mobile Theft Tracking Application Prof. Kishore N. Shedge 1, Dnyaneshwar C. Dhatrak2, Kanchan S. Ugale3, Asmita P. Walimbe4, Anil S. Khade5 1 ME (Computer), S.V.I.T, Chincholi, Nasik, Maharashtra – 422102. 2345 B.E (Computer), S.V.I.T, Chincholi, Nasik, Maharashtra – 422102. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract- This project aims to find stolen or lost phone with the help of different GPS location, IMEI (InternationalMobileEquipmentIdentity) Numberofphone. When the application is install it will work in background. This application stores the uniqueuserid& password, SIM Number, alternative phone number, E- mail id, whats app number, phones current location. When phone is stolen or loss user will get the images which are capture by front camera, GPS location on alternative phone number & also on given mail id, with the help of these information we can easily find out phone & the person who has stolen the smartphone. Key Words: Mobile tracking, sim tracking, latitude and longitude, user registraction, sms/email/text/whatsapp. 1. INTRODUCTION Smart phone is a mobile phone which offers advanced technologies with functionality similar as a personal computer. With the growing speed of technological advancement, smart phones have become the essential components of our daily performance. These smartphones todaycandoalmost everything. Faster networking systems, attractive and powerful applicationsandthetechnologyliterateusers are making these smart phones very powerful these days. Smart phone are the best digital devices of present which provides what a human needs. Today everyone has a smart phone instead of having a simple phone which provides features of only doing calls or text messages but havingasmartphoneisbeneficialby this we can do our office work on MS Office, can check our mails any time anywhere and there are a lot of more things that we can do. Mobile phone has the personal information. If the phone is stolen thenthereispossibilityofmisuseof this information. There may be any personal or financial problems can be happen. So finding stolen phone is very important task. There are some technology and technique available. Using that we can find out the stolen phone. In India if the phone isstolen or loss then finding that phone becomes very complicated process. We need to file a case in police station and follow a lenghthy procedure. So to make this process easy and comfortable. Wehavedeveloped an android application. [2] In this application we can find the smartphone by the help of IMEI (International Mobile Equipment Identity) numbering system, which is a 15 digit unique code that is used to identify the GSM (Global System Mobile) phone. This application uses the latest technology like SMS, Internet (Short Message Services) through using it you can send thief’s picture which will be captured using front camera and current location of the IMEI number. It gives the exact details about the thief and his/her last location. If the SIM is changed then the location will be sent to email id or the alternative number of the user which is given by user at the time of installation of this application. [3] 3. METHODOLOGY & RELATED WORK We have proposed three methods to track location of the lost smartphone. One is the basic where we get SMS whenever SIM card is changed, second method is track GPS location of phone by using google map and the third method is we capture the images of thief. 3.1 Basic Method In Basic Method we use SIMuniquenumberfor identification of authorised user. SIM number is nothing but the sequence of ten digit numbers. Every SIM has its own unique number. When the phone is stolen thief will replace the SIM by its own SIM card then so the new SIM number will not match with previous SIM number, this will create an alert message
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 621 and this alert message will be sent to the alternative number which is registered at the time of installation of application. With the help of this new number we can easily find out the location of the smartphone. 3.2 GPS Location In Second method we can find the location of phone number. Every phone has unique IMEI number. And we can easily track this number using GPS system. A GPS satellite revolves round the earth twice a day in an orbit and transmit signal data to earth. When a mobile is lost or stolen then the application will run andit activatestheGPSandmobile network. This application sends location to the user through mail in intervalofoneminute.Theusergoesto the location and catches the lost phone. Then the users stop the application by using his password.[6] 3.2 Snapshot of thief When the phone is stolen thief will replace the SIM by its own SIM card then so the new SIM number will not match with previous SIM number, which will create an alert message and capture some of the snapshots from frontcameraandsendthose snapshots to registered alternative number&alsoonuser’semail id. Using these three methods it is easy to find stolen phone. 4. SYSTEM ARCHITECTURE Fig. -1: System Architecture Above figure shows the architecture & flow of application. It shows the use of each object. 5. SYSTEM IMPLIMENTATION Applicaton installation module is used to build the android application using eclipse environment with an android developmentkit.Tostarttheemulator for development of the application. There will be the emulator to create the new application. There will be the main module to develop. To create an innovative android application for anti-theft mobile tracker for smart phones and to install theapplicationtomobile.It is used to fetch the real data from user and store into database using SQL Lite. [2]. In this module first user interface where user has to provide User Id, Password, SIM, IMEI number, E-mail ID and alternate number then click submit button. Next it will store information in the database. This information is surely protected by encryption. User can change the alternate number and IEMI number whenever they want. 5.1 How to open CAMERA Automatically To do such operation android SDK provides some libraries or API (Application Program Interface). Using these API we can operate the camera using another application. To do this we need to assignsome camera permission in manifest file. <uses-permission android:name=””android.permission.CAMERA”/> We should also check whether camera is ready or not and number of available camera. For ex. Front & rear camera. This can be check by calling following method PackageManager.hasSystemFeature() and Camera.getNumberOfCameras() To capture Photos and Video Android framework gives Camera API & CameraIntent. After it finishes capturing photos it will call onActivityMethod () where the data gets stored in the SD card. 5.1 How to Send MMS & Email Automatically As we are going to use SIM & message services for sending the location and SIM number we need to assign some permission. To perform such operation one has to takepermissionbydeclaringinmanifestfile. MMS is different than SMS. So we have to requestsome
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 622 extra permission. MMS uses private API’s. This API’s are not provided by android SDK. To send MMS we use Android GIT repositories. Which it gives internal permissions to send MMS with any image file. To send email we have to set permission for internet services in manifest file to open network socket for an application. <uses-permission android:name=””android.permission.INTERNET”;> To send email we can also use private API’s like providing Gmail. In this there are three jar files mail.jar, activation.jar, additionl.jar which provides to send email automatically. 7. ADVANTAGES & DISADVANTAGES 7.1 ADVANTAGES 1) You will gate Current location of the thief. 2) User & alternative Number get SMS from new SIM CARD if it is changed. 3) You will get thief’s pictures 7.2 DISADVANTEGES 1) -Your phone should be connected to internet 2) -Your phone should be GPS System CONCLUSION This paper presents an anti theft mobile tracking application. This application provides strong security to Smartphone when it is lost or stolen by thief. It gives the location as well as photos of thief to user on alternative number and email id provided by user. With the advent of time, technology is updating every day. Our application further will be updated and improved. Currently this applicationworksonandroid operating system. In future we are trying to make this application for iOS & windows mobile OS. This will be our future scope. ACKNOWLEDGEMENT We take this opportunity to express ourhearty thanks to all those who helped us in the completion of the Paper. We express our deep sense of gratitude to our Project Guide Prof. K.N. Shedge, Asst. Prof., Computer Engineering Department, Sir Visvesvaraya Institute of Technology, Chincholi for his guidance and continuous motivation. We gratefullyacknowledgethe help provided by him on many occasions, for improvement of this project report with great interest. We would be failing in ourduties, ifwe do not express our deep sense of gratitude to Prof. S. M. Rokade, Head, Computer Engineering Department for permitting us to avail the facility and constant encouragement. Lastlywe wouldlike to thank all the staff members, colleagues, and all our friends for their help and support fromtime to time. 9. REFERENCES 1) Smartphone tracking application using short message service. 2) Anti-Theft Tracking System for Smart Phones by K. Subha, Dr. S. Sujatha Department of Computer Application, M.C.A, Anna University, Trichy, Tamilnadu, India. 3) Mobile Theft Detection with Automatic Location Tracking By Android Application R.Vignesh Kumar, S.Venkatesh and G.Nagarajan Department Of Information Technology, S.K.P.EngineeringCollege, India 4) Anti-Theft Application for Android Based Devices by Shweta Dhanu, Afsana Shaikh, Shweta Barshe Bharati Vidyapeeth College of Engineering, Navi Mumbai, India. 5) Mobile Tracing Software for Android Phone Anuradha Sharma1, Jyoti Sharma4,DipeshMonga2, 1Information Technology, College of Technology and Engineering, Udaipur 6) [6] https://android.googlesource.com/, last accessed on Aug 06, 2013. 7) An Intelligent Tracking System Based on GSM and GPS Using Smartphone Vigneshwaran.K 1, Sumithra.S2, Janani.R3 PG Student (M.E- Communication Systems), 8) K.S. Kuppusamy1, Senthilraja.R2, G. Aghila3, MOBILE LOCATION ESTIMATION AND TRACKING FOR GSM SYSTEMS Vol. 4, Issue 5, June 2015
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 01 | Jan -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 623 9) J.manibharathi,S.Hemalatha, V.Aishwarya, C.Meenapriya, L.Hepzibha Shekinah Grace, “Advancement in Mobile Communication using Android”, International Journal of Computer Applications (0975 – 8887), Volume 1 – No.7,2010. 10) Chao-Lin Chen; Kai-Ten Feng; "Hybrid Location Estimationand TrackingSystemforMobileDevices" IEEE 61st Conference on Vehicular Technology Volume 4, 2005 11) Kalinin, E. (2012). User needs for location-aware mobile services. Personal and ubiquitous computing, 7(1), 70-79 12) Lin, Ding-Bing B.”Mobile location estimation and tracking for GSM systems” IEEE 15th International Conference on Personal, Indoor and Mobile Radio Communications, vol.4, pp.2835-2839