CFP last date
20 December 2024
Reseach Article

Intruder Detection and Recognition System

by Divya Gurnani, Vijay Gaikwad, Pradip V Gurnani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 178 - Number 20
Year of Publication: 2019
Authors: Divya Gurnani, Vijay Gaikwad, Pradip V Gurnani
10.5120/ijca2019919030

Divya Gurnani, Vijay Gaikwad, Pradip V Gurnani . Intruder Detection and Recognition System. International Journal of Computer Applications. 178, 20 ( Jun 2019), 30-34. DOI=10.5120/ijca2019919030

@article{ 10.5120/ijca2019919030,
author = { Divya Gurnani, Vijay Gaikwad, Pradip V Gurnani },
title = { Intruder Detection and Recognition System },
journal = { International Journal of Computer Applications },
issue_date = { Jun 2019 },
volume = { 178 },
number = { 20 },
month = { Jun },
year = { 2019 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume178/number20/30652-2019919030/ },
doi = { 10.5120/ijca2019919030 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:50:58.560723+05:30
%A Divya Gurnani
%A Vijay Gaikwad
%A Pradip V Gurnani
%T Intruder Detection and Recognition System
%J International Journal of Computer Applications
%@ 0975-8887
%V 178
%N 20
%P 30-34
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Earlier intrusion detection systems included manpower, but in this paper an automatic system has been proposed which detects the intruder and recognizes it also. An ultrasonic sensor has been interfaced with an Arduino which detects an intrusion. For intruder recognition, object detection classification has been performed. This method includes both computer vision and machine learning for testing and training of data. Hence this proposed method uses technology which is new and growing.

References
  1. Mary Lynn Garcia,1 - Design and Evaluation of Physical Protection Systems,Editor(s): Mary Lynn Garcia,Design and Evaluation of Physical Protection Systems (Second Edition),Butterworth-Heinemann,2008,Pages1-11,ISBN 9780750683524,https://doi.org/10.1016/B978-0-08-055428-0.50005-1.
  2. Hussain, Sajid & Peters, Richard & Silver, Daniel. (2008). Using received signal strength variation for surveillance in residential areas. Proceedings of SPIE - The International Society for Optical Engineering. 6973. 10.1117/12.778008.
  3. Muhannad Quwaider and Subir Biswas. 2008. Body posture identification using hidden Markov model with a wearable sensor network. In Proceedings of the ICST 3rd international conference on Body area networks (BodyNets '08). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, Article 19, 8 pages..
  4. Robert Collins, Alan Lipton, Takeo Kanade, Hironobu Fujiyoshi, David Duggins, Yanghai Tsin, David Tolliver, Nobuyoshi Enomoto and Osamu Hasegawa. A System for Video Surveillance and Monitoring.Tech. Report, CMU-RI-TR-00-12, Robotics Institute, Carnegie Mellon University, May, 2000
  5. Prakash, U. M., Thamaraielvi, V. G., 2014. Detecting and tracking of multiple moving objects for intelligent video surveillance systems. In: Proceedings of the 2nd International Conference on Current Trends in Engineering and Technology (ICCTET), July, 253-257.
  6. Dimou, A., Medentzidou, P., Álvarez, F., et al., 2016. Multi-target detection in CCTV footage for tracking applications using deep learning techniques. In: Proceedings of the IEEE International Conference on Image Processing (ICIP), Sep, 928–932
  7. Saran, K. B., Sreelekha, G., 2015. Traffic video surveillance: Vehicle detection and classification. In: Proceedings of the IEEE International Conference on Control Communication & Computing India (ICCC), Nov, 516-521..
  8. Seung Hyun Kim, Su Chang Lim, Do Yeon Kim, "Intelligent intrusion detection system featuring a virtual fence, active intruder detection, classification, tracking, and action recognition," Department of Computer Engineering, Sunchon National University, 255 Jungang-Ro, Sunchon, Jeonnam 57922, Republic of Korea
  9. T. F. Cootes, G. J. Edwards and C. J. Taylor, "Active appearance models," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 23, no. 6, pp. 681-685,June,2001.doi: 10.1109/34.927467
  10. Ognjen Arandjelović, Abdelhakim Bendada ,Xavier Maldague. (2013). Infrared face recognition: A comprehensive review of methodologies and databases,Volume 47, Issue 9, September 2014, Pages 2807-2824
  11. Guillemaut JY., Kittler J., Sadeghi M.T., Christmas W.J. (2006) General Pose Face Recognition Using Frontal Face Model. In: Martínez-Trinidad J.F., Carrasco Ochoa J.A., Kittler J. (eds) Progress in Pattern Recognition, Image Analysis and Applications. CIARP 2006. Lecture Notes in Computer Science, vol 4225. Springer, Berlin, Heidelberg
  12. Heo J., Savvides M. (2008) Face Recognition Across Pose Using View Based Active Appearance Models (VBAAMs) on CMU Multi-PIE Dataset. In: Gasteratos A., Vincze M., Tsotsos J.K. (eds) Computer Vision Systems. ICVS 2008. Lecture Notes in Computer Science, vol 5008. Springer, Berlin, Heidelberg
  13. Gao H., Ekenel H.K., Stiefelhagen R. (2009) Pose Normalization for Local Appearance-Based Face Recognition. In: Tistarelli M., Nixon M.S. (eds) Advances in Biometrics. ICB 2009. Lecture Notes in Computer Science, vol 5558. Springer, Berlin, Heidelberg
  14. S. Gao, Y. Zhang, K. Jia, J. Lu and Y. Zhang, "Single Sample Face Recognition via Learning Deep Supervised Autoencoders," in IEEE Transactions on Information Forensics and Security, vol. 10, no. 10, pp. 2108-2118, Oct. 2015.doi: 10.1109/TIFS.2015.2446438
  15. Captions should be Times
Index Terms

Computer Science
Information Sciences

Keywords

Intrusion detection system Ultrasonic sensor intruder recognition Computer Vision Machine Learning.