Skip to main content

Smart Physical Intruder Detection System for Highly Sensitive Area

  • Conference paper
  • First Online:
  • 688 Accesses

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 165))

Abstract

In this ever-growing world of automation and digitization, where data is a pivotal element for the growth of every individual, institution, and organization, whether digital or physical, data could also be the reason for destruction, if acquired by an antagonist through unconventional access. Data is a very sensitive point in all the domains ranging from an individual’s personal space to tactical military centers such as defense institutions, military matters, financial institutions, hospitals, and educational institutions. Thus, it is necessary to protect the data from intruders. Physical Intruder Detection is equally important as the detection of intrusion in computer networks. Though the later is always digital and without manual intervention. Physical Intruder Detection can be either digital or done manually. The paper presents a system for an enclosed area, based on IoT and supported by Digital Image Processing, to capture any Physical Intruder who breaches the security system and alert the rightful person regarding the intrusion. The approach uses the PIR motion sensor to detect any suspicious activity, turn on the webcam and with the help of Face Recognition System using Digital Image Processing, recognizes whether it is the rightful person or not. If it is an Intruder, then the webcam will start recording the activity of the Intruder and send a text message as well as an email to the system owner alerting him/her/them about the intrusion. A link to this live feed to the system owner is also attached to the alert message and mail. This Intruder Detection System is energy efficient as well because the webcam will be turned on only when the motion sensor detects any suspicious activity.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sukmana, H.T., Farisi, M.G., Khairani, D.: Prototype utilization of PIR motion sensor for real time surveillance system and web-enabled lamp automation. In: IEEE Asia Pacific Conference on Wireless and Mobile (2015)

    Google Scholar 

  2. Bartlett, M.S., Movellan, J.R., Sejonowski, T.J.: Face recognition by independent component analysis. IEEE Trans. Neural Netw. 13(6), 1450–1464 (2002)

    Article  Google Scholar 

  3. Oludele, A., Ayodele, O., Oladele, O., Olurotimi, S.: Design of an automated intrusion detection system incorporating an alarm. J. Comput. ISSN: 2151-9617 (2009)

    Google Scholar 

  4. Kodali, R.K., Soratkal, S.R.: MQTT based home automation system using ESP8266. In: IEEE Region 10 Humanitarian Technology Conference (2016)

    Google Scholar 

  5. Freer, J.A., Beggs, B.J., Fernandez-Canque, H.L., Chevrier, F., Goryashko, A.: Automatic video surveillance with intelligent scene monitoring and intruder detection. ECOS, pp. 109–133 (1997). https://doi.org/10.1049/cp:19970433

  6. Monzo, D., Albiol, A., Albiol, A., Mossi, J.M.: A comparative study of facial landmark localization methods for face recognition using HOG descriptors. In: Proceedings of IEEE (2010)

    Google Scholar 

  7. Jayant: PIR sensor based motion detector/sensor circuit. (2015) Retrieved from https://circuitdigest.com/electronic-circuits/pir-sensor-based-motion-detector-sensor-circuit

  8. Nguyen, H.-Q., Loan, T.T.K., Mao, B.D., Huh, E.-N.: Low Cost Real-Time System Monitoring Using Raspberry Pi. Computer Engineering Department, Kyung Hee University, Yongin, South Korea (2015)

    Google Scholar 

  9. Suganthy, M., Ramamoorthy, P.: Principal component analysis based feature extraction, morphological edge detection and localization for fast iris recognition. J. Comput. Sci. 8(9), 1428–1433, ISSN 1549-3636 (2012)

    Google Scholar 

  10. Viola, P., Jones, M.J.: Robust real-time face detection. Int. J. Comput. Vis. 57(2), 137–154 (2004)

    Article  Google Scholar 

  11. Ming, Y., Ruan, Q., Li, X., Mu, M.: Efficient kernel discriminate spectral regression for 3D face recognition. In: Proceedings of ICSP 2010 (2010)

    Google Scholar 

  12. Huang, L.-L., Shimizu, A., Hagihara, Y., Kobatake, H.: Face Detection from Cluttered Images Using a Polynomial Neural Network. Elsevier Science (2002)

    Google Scholar 

  13. Paul, L.C., Suman, A.A., Sultan, N.: Methodological analysis of principal component analysis (PCA) method. Int. J. Comput. Eng. Manag. 16(2), 32–38 (2013)

    Google Scholar 

  14. Castells, F., Laguna, P., Sornmo, L., Bollmann, A., Roig, J.M.: Principal component analysis in ECG signal processing. EURASIP J. Adv. Signal Process. 2007, 1–21 (2007)

    Google Scholar 

  15. Jolliffe, I.T., Cadima, J.: Principal component analysis: a review and recent developments. Philos. Trans. A Math. Phys. Eng. Sci. 374(2065), 0150202. 13 Apr 2016 (2016)

    Article  MathSciNet  Google Scholar 

  16. Guo, G., Wang, H., Bell, D., Bi, Y., Greer, K.: KNN Model-Based Approach in Classification, pp. 1–12

    Google Scholar 

  17. Imandoust, S.B., Bolandraftar, M.: Application of K-nearest neighbor (KNN) approach for predicting economic events: theoretical background. Int. J. Eng. Res. Appl. 3(5), 605–610 (2013)

    Google Scholar 

  18. Moise, I., Pournaras, E., Helbing, D.: K-Nearest Neighbour Classifier. ETH zurich (2015)

    Google Scholar 

  19. Vermeulen, J., Hillebrand, A., Geraerts, R.: A comparative study of k-nearest neighbor techniques in crowd simulation. In: 30th Conference on Computer Animation and Social Agents, 23 May 2017 (2017)

    Article  Google Scholar 

  20. Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The Hadoop distributed file system. In: IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST) (2010)

    Google Scholar 

  21. Aswinth Raj, B.: How to Send Text Message (SMS) Using ESP8266. (2003) Retrieved from https://circuitdigest.com/microcontroller-projects/sending-sms-using-esp8266

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Smita Kasar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kasar, S., Kshirsagar, V., Bokan, S., Rathod, N. (2020). Smart Physical Intruder Detection System for Highly Sensitive Area. In: Zhang, YD., Mandal, J., So-In, C., Thakur, N. (eds) Smart Trends in Computing and Communications. Smart Innovation, Systems and Technologies, vol 165. Springer, Singapore. https://doi.org/10.1007/978-981-15-0077-0_23

Download citation

Publish with us

Policies and ethics