Abstract
The latest progress in the technology has led to automation and digitization in almost every fields, and has influenced a wide scope of application. This has caused enormous amount of data flow from each sectors, where the information contained in the data acts as the important component for the progress of the single person, organization, state, country and so on. These data with valuable information can be used in the constructive and the destructive perceptive based on the hands that handle it. So protective measures become very essential for preserving the data from unwanted access. This paves for developing a system to identify the suspicious movement in the volatile areas like military regimes, hospitals and financial organizations to safe the data. The method put forward in the paper incorporates the motion sensors and the face identification system to detect the suspicious activities and report to the lawful person. The algorithm for the system was developed using the python and tested for various sets of exemplary real time video recordings to know the accuracy in the detection.
References
Freer, J. A., B. J. Beggs, H. L. Fernandez-Canque, F. Chevrier, and A. Goryashko. "Automatic video surveillance with intelligent scene monitoring and intruder detection." In 1996 30th Annual International Carnahan Conference on Security Technology, pp. 89-94. IEEE, 1996.
Bartlett, Marian Stewart, Javier R. Movellan, and Terrence J. Sejnowski. "Face recognition by independent component analysis." IEEE Transactions on neural networks 13, no. 6 (2002): 1450-1464.
Huang, Lin-Lin, Akinobu Shimizu, Yoshihiro Hagihara, and Hidefumi Kobatake. "Face detection from cluttered images using a polynomial neural network." Neurocomputing 51 (2003): 197-211.
Viola, Paul, and Michael J. Jones. "Robust real-time face detection." International journal of computer vision 57, no. 2 (2004): 137-154.
Oludele, Awodele, Ogunnusi Ayodele, Omole Oladele, and Seton Olurotimi. "Design of an automated intrusion detection system incorporating an alarm." arXiv preprint arXiv:0912.3921 (2009).
Monzo, David, Alberto Albiol, Antonio Albiol, and Jose M. Mossi. "A comparative study of facial landmark localization methods for face recognition using hog descriptors." In 2010 20th International Conference on Pattern Recognition, pp. 1330-1333. IEEE, 2010.
Ming, Yue, Qiuqi Ruan, Xiaoli Li, and Meiru Mu. "Efficient Kernel discriminate spectral regression for 3D face recognition." In IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, pp. 662-665. IEEE, 2010.
Shvachko, Konstantin, Hairong Kuang, Sanjay Radia, and Robert Chansler. "The hadoop distributed file system." In 2010 IEEE 26th symposium on mass storage systems and technologies (MSST), pp. 1-10. Ieee, 2010.
Suganthy, M., and P. Ramamoorthy. "Principal component analysis based feature extraction, morphological edge detection and localization for fast iris recognition." Journal of Computer science 8, no. 9 (2012): 1428.
Nguyen, Huu-Quoc, Ton Thi Kim Loan, Bui Dinh Mao, and Eui-Nam Huh. "Low cost real-time system monitoring using Raspberry Pi." In 2015 Seventh International Conference on Ubiquitous and Future Networks, pp. 857-859. IEEE, 2015.
Kodali, Ravi Kishore, and SreeRamya Soratkal. "MQTT based home automation system using ESP8266." In 2016 IEEE Region 10 Humanitarian Technology Conference (R10-HTC), pp. 1-5. IEEE, 2016.
Javare, Amirush, Tushar Ghayal, Jayant Dabhade, Ankur Shelar, and Ankita Gupta. "Access control and intrusion detection in door lock system using Bluetooth technology." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), pp. 2246-2251. IEEE, 2017.
Muema, Faith M., Patrick G. Home, and James M. Raude. "Application of benchmarking and principal component analysis in measuring performance of public irrigation schemes in Kenya." Agriculture 8, no. 10 (2018): 162.
Raj, J. S. (2019). Qos Optimization of Energy Efficient Routing In Iot Wireless Sensor Networks. Journal of ISMAC, 1(01), 12-23.
Kumar, R. Praveen, and S. Smys. "A novel report on architecture, protocols and applications in Internet of Things (IoT)." In 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp. 1156-1161. IEEE, 2018.
Pandian, A. P. (2019). Artificial Intelligence Application in Smart Warehousing Environment for Automated Logistics. Journal of Artificial Intelligence, 1(02), 63-72.
Wang, H. (2019). Sustainable Development and Management in Consumer Electronics Using Soft Computation. Journal of Soft Computing Paradigm (JSCP), 1(01),56.
