Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

CCTV Intelligent Surveillance on Intruder Detection

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Authors:
Kajenthani Kanthaseelan, Paskaran Pirashaanthan, Jasmin Jelaxshana A.A.P, Akshaya Sivaramakrishnan, Kavinga Yapa Abeywardena, Tharika Munasinghe
10.5120/ijca2021921035

Kajenthani Kanthaseelan, Paskaran Pirashaanthan, Jasmin Jelaxshana A.A.P, Akshaya Sivaramakrishnan, Kavinga Yapa Abeywardena and Tharika Munasinghe. CCTV Intelligent Surveillance on Intruder Detection. International Journal of Computer Applications 174(14):29-34, January 2021. BibTeX

@article{10.5120/ijca2021921035,
	author = {Kajenthani Kanthaseelan and Paskaran Pirashaanthan and Jasmin Jelaxshana A.A.P and Akshaya Sivaramakrishnan and Kavinga Yapa Abeywardena and Tharika Munasinghe},
	title = {CCTV Intelligent Surveillance on Intruder Detection},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2021},
	volume = {174},
	number = {14},
	month = {Jan},
	year = {2021},
	issn = {0975-8887},
	pages = {29-34},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume174/number14/31747-2021921035},
	doi = {10.5120/ijca2021921035},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

With the technology today, the detection of intruders was introduced to decrease theft and crimes. The implementation of this system is made at home. A system with just records of theft would not work, the system should be efficient and faster to detect thefts effortlessly. The goal of this system is to give a new direction of innovation in the closed- circuit television video image processing in computer vision. Having a system to monitor and notify users of potential threats must be implemented, as well as predicting a child’s movements at home. Doing this in real-time ensures a lot of human labor to be minimized while also ensuring recognition using computer vision. This document provides an outline of the intrusion detection system and danger prevention system for children outside and inside the home environment, with the help of image processing, face recognition, and training of the model through machine learning. For an instance, if a kid at home reached near the well in the garden area, system predicts whether the kid is reaching the well by deriving it from the distance calculated earlier and sends an alert to the mobile or any device where an application is installed. Same prediction applies for any intruders to reach the home or any restricted places at home.

References

  1. Garima Mathur and Dr. Mahesh Bundele, "Research on Intelligent Video Surveillance Techniques for Suspicious Activity Detection - Critical Review", International Conference on Recent Advances and Innovations in Engineering 2016Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
  2. K. Dailey, "The rise of CCTV surveillance in the US," 29, April 2013.
  3. J. Park, J. Choi, M. Park, S. Hong, and H. Kim, "A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment," International Journal of Security and Its Applications, vol. 6, pp. 211-216, 2012.
  4. M. Vidanapathirana, "Real-time Human Detection in Computer Vision — Part 1," 24 Mar 2018. [Online]. Available: https://medium.com/@madhawavidanapathirana/https- medium-com-madhawavidanapathirana-real-time-human-detection-in- computer-vision-part-1-2acb851f4e55. [Accessed 07 Jun 2020].
  5. S. Ren, K. He, R. Girshick and J. Sun, "Faster R-CNN: Towards Real- Time Object Detection with Region Proposal Networks," Microsoft Research.
  6. Phillips, P. Jonathon. "Support vector machines applied to face recognition." Advances in Neural Information Processing Systems.
  7. D. S. Vasant, B. A. Arun and M. P. Shivaji, "Raspberry-pi-based anti- theft security system with image feedback," Journal of Information, Knowledge, and Research in Electronics and Communication Engineering, vol. 04, no. 02, 2017.
  8. GV Balakrishna, B. Santhosh Kumar, "Smart intruder detection using video surveillance," International Journal of Science Technology and Management, vol no.5, Issue no.2, February 2016.
  9. Rajeev Thaware, "Real-Time Face Detection and Recognition with SVM and HOG Features," Monday, May28,2018.[Online].Available:https://www.eeweb.com/profile/rajeevthawa re/articles/real-time-face-detection-and-recognition-with-svm-and-hog- features.
  10. F. Emmert-Streib and M. Dehmer, "Evaluation of Regression Models: Model Assessment, Model Selection, and Generalization Error," Machine Learning and Knowledge Extraction, vol. 1, no. 1, pp. 521–551, Mar. 2019.
  11. A.N. Ansari, M.Sedky, N.Sharma and A.Tyagi, "An Internet of Things Approach for Motion Detection using Raspberry Pi, "2015.

Keywords

Intrusion, image processing, face detection, rule-based notification