Author:
T.Krishna Prasath, Hareesh, Mohamed PahadPublished in
Journal of Science Technology and Research( Volume , Issue )
1. Sujith B, “Crime detection and avoidance in ATM: a new framework,” International Journal of Computer Science and Information Technologies, 2014.
2. Nithya Shree R, Rajeshwari Sah and Shreyank N Gowda, “Surveillance video based robust detection and notification of real time suspicious activities in indoor scenarios,” The sixth international conference on computer science, engineering and information technology, 2016.
3. Hidetomo Sakaino, “Video-Based Tracking, Learning and Recognition Method for Multiple Moving Objects,” IEEE Transactions on Circuits and Systems for Video Technology, VOL. 23, NO. 10, OCTOBER 2013.
4. Zhiqian Chen, Vishal Sanserwal, Vikas Tripathi and Monika Pandey, “Comparative Analysis of Various Feature Descriptors for Efficient ATM Surveillance Framework,” IEEE International Conference on Computing, Communication and Automation (ICCCA) 2017.
5. Rune Havnung Bakken and Lars Moland Eliassen, “Realtime 3D Skeletonisation in Computer Vision-Based Human Pose Estimation Using GPGPU,” IEEE Conference on Image Processing Theory, Tools and Applications, 2012.
6. Haitham Hasan and S. Abdul Kareem, “Human Computer Interaction for Vision Based Hand Gesture Recognition: A Survey.” IEEE International Conference on Advanced Computer Science Applications and Technologies, 2013.
7. Rishabh Agrawal and Nikita Gupta, “Real Time Hand Gesture Recognition for Human Computer Interaction,” IEEE 6th International Conference on Advanced Computing, 2016.
8. Hong Cheng, Lu Yang and Zicheng Liu, “Survey on 3D Hand Gesture Recognition,” IEEE Transactions on Circuits and Systems for Video Technology, VOL. 26, NO. 9, SEPTEMBER 2016.
9. Miwa takai, “Detection of suspicious activity and estimate of risk from human behaviour shot by surveillance camera” Nature and Biologically Inspired Computing (NaBIC), 2010 Second World Congress, IEEE 2011.10. Sambarta Ray, Souvik Das and Dr. Anindya Sen, “An Intelligent Vision System for monitoring Security and Surveillance of ATM” India Conference (INDICON), 2015 Annual IEEE.
11. Tadashi Ogino, “Anomaly Detection System for Video Data Using Machine Learning”, International Journal of Knowledge Engineering, Vol. 2, No. 2, June 2016
12. Kamarul Hawari Ghazali, Mohd. Marzuki Mustafa and Aini Hussain, “Feature Extraction Technique Using SIFT Key point Descriptors”, Proceedings of the International Conference on Electrical Engineering and Informatics Institute of Technology Bandung, Indonesia June 17-19, 2007.
13. Juan Zhu, Shuai Wang and Fanying Meng, “SIFT Method for Paper Detection System”, IEEE conference on 2011.
14. Pengwenlong Gu, Rida Khatoun, Youcef Begriche and Ahmed Serhrouchni, “Support Vector Machine (SVM) Based Sybil Attack Detection in Vehicular Networks”, IEEE conference on 2017.
15. Karthick, R., et al. “Overcome the challenges in bio-medical instruments using IOT–A review.” Materials Today: Proceedings (2020). https://doi.org/10.1016/j.matpr.2020.08.420
16. Karthick, R., et al. “A Geographical Review: Novel Coronavirus (COVID-19) Pandemic.” A Geographical Review: Novel Coronavirus (COVID-19) Pandemic (October 16, 2020). Asian Journal of Applied Science and Technology (AJAST)(Quarterly International Journal) Volume 4 (2020): 44-50.
17. Sathiyanathan, N. “Medical Image Compression Using View Compensated Wavelet Transform.” Journal of Global Research in Computer Science 9.9 (2018): 01-04.
18. Karthick, R., and M. Sundararajan. “SPIDER-based out-of-order execution scheme for Ht-MPSOC.” International Journal of Advanced Intelligence paradigms 19.1 (2021): 28-41. https://doi.org/10.1504/IJAIP.2021.114581
19. Sabarish, P., et al. “An Energy Efficient Microwave Based Wireless Solar Power Transmission System.” IOP Conference Series: Materials Science and Engineering. Vol. 937. No. 1. IOP Publishing, 2020. doi:10.1088/1757-899X/937/1/012013
20. Vijayalakshmi, S., et al. “Implementation of a new Bi-Directional Switch multilevel Inverter for the reduction of harmonics.” IOP Conference Series: Materials Science and Engineering. Vol. 937. No. 1. IOP Publishing, 2020. doi:10.1088/1757-899X/937/1/01202621. Karthick, R., and M. Sundararajan. “Hardware Evaluation of Second Round SHA-3 Candidates Using FPGA (April 2, 2014).” International Journal of Advanced Research in Computer Science & Technology (IJARCST 2014) 2.2.
22. Karthick, R., et al. “High resolution image scaling using fuzzy based FPGA implementation.” Asian Journal of Applied Science and Technology (AJAST) 3.1 (2019): 215-221.
23. P. Sabarish, R. Karthick, A. Sindhu, N. Sathiyanathan, Investigation on performance of solar photovoltaic fed hybrid semi impedance source converters, Materials Today: Proceedings, 2020, https://doi.org/10.1016/j.matpr.2020.08.390
24. Karthick, R., A. Manoj Prabaharan, and P. Selvaprasanth. “Internet of things based high security border surveillance strategy.” Asian Journal of Applied Science and Technology (AJAST) Volume 3 (2019): 94-100.
25. Karthick, R., and M. Sundararajan. “A novel 3-D-IC test architecture-a review.” International Journal of Engineering and Technology (UAE) 7.1.1 (2018): 582-586.
26. Karthick, R., and M. Sundararajan. “Design and implementation of low power testing using advanced razor based processor.” International Journal of Applied Engineering Research 12.17 (2017): 6384-6390.
27. Karthick, R., and M. Sundararajan. “A Reconfigurable Method for TimeCorrelatedMimo Channels with a Decision Feedback Receiver.” International Journal of Applied Engineering Research 12.15 (2017): 5234-5241.
28. Karthick, R., and M. Sundararajan. “PSO based out-of-order (ooo) execution scheme for HT-MPSOC.” Journal of Advanced Research in Dynamical and Control Systems 9 (2017): 1969.
29. Karthick, R. “Deep Learning For Age Group Classification System.” International Journal Of Advances In Signal And Image Sciences 4.2 (2018): 16-22.
30. Karthick, R., and P. Meenalochini. “Implementation of data cache block (DCB) in shared processor using field-programmable gate array (FPGA).” Journal of the National Science Foundation of Sri Lanka 48.4 (2020). http://doi.org/10.4038/jnsfsr.v48i4.10340
31. Suresh, Helina Rajini, et al. “Suppression of four wave mixing effect in DWDM system.” Materials Today: Proceedings (2021). https://doi.org/10.1016/j.matpr.2020.11.545
32. M. Sheik Dawood, S. Sakena Benazer, N. Nanthini, R. Devika, R. Karthick, Design of rectenna for wireless sensor networks, Materials Today: Proceedings, 2021. https://doi.org/10.1016/j.matpr.2020.11.905
33. M. Sheik Dawood, S. Sakena Benazer, R. Karthick, R. Senthil Ganesh, S. Sugirtha Mary, Performance analysis of efficient video transmission using EvalSVC, EvalVid-NT, EvalVid, Materials Today: Proceedings,2021. https://doi.org/10.1016/j.matpr.2021.02.287.
ABSTRACT:
The IoT-Based Intruder Prevention system using Fogger provides an intelligent and automated approach to enhancing public security. Traditional surveillance relies heavily on manual monitoring, which is time-consuming and often inaccurate. To address this, our system uses deep learning models like Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) to detect anomalies in real-time video footage. Once suspicious activity is identified, the system instantly triggers a fogger to obscure the intruder’s vision and sends an alert to the security team. This dual response minimizes human intervention and accelerates the threat response time. This IoT Based Intruder Prevention system highlights specific frames and areas containing abnormal behavior, making it easier for authorities to assess threats. Moreover, the integration of IoT technology enables remote monitoring and control, increasing flexibility and reliability. Designed for high-risk environments such as banks, malls, and offices, this system ensures improved safety, reduced workload for personnel, and faster.
INTRODUCTION:
Security has become a growing concern due to the increasing number of disruptive and offensive activities. Although CCTV surveillance is widely used in public and private spaces, constant human monitoring is nearly impossible and highly inefficient. To overcome this limitation, we developed an automated system that uses deep learning and IoT to detect suspicious behavior in real-time. Our approach eliminates the need for continuous manual supervision by intelligently identifying anomalies in video frames. Using CNN for feature extraction and RNN with LSTM for sequence prediction, the system accurately detects abnormal movements. Once a threat is identified, it immediately activates a fogger to obscure visibility and prevent further intrusion. Additionally, it alerts security personnel with specific timestamps and frame highlights. By integrating automation and machine learning, the system enhances the efficiency of surveillance operations and ensures improved public safety across locations like banks, malls, and institutions.