Video-based Real-time Intrusion Detection System using Deep-Learning for Smart City Applications

被引:16
作者
Nayak, Rashmiranjan [1 ]
Behera, Mohini Mohan [1 ]
Pati, Umesh Chandra [1 ]
Das, Santos Kumar [1 ]
机构
[1] NIT Rourkela, Dept ECE, Rourkela 769008, Odisha, India
来源
13TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (IEEE ANTS) | 2019年
关键词
Deep learning; intrusion detection system; transfer learning; smart city; SORT algorithm; YOLO algorithm;
D O I
10.1109/ants47819.2019.9117960
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
There is a huge demand of video surveillance based intelligent security systems which can automatically detect the unauthorized entry or mal-intentional intrusion to the unattended sensitive areas and notify to the concerned authorities in real-time. A novel video-based Intrusion Detection System (IDS) using deep learning is proposed. Here, You Only Look Once (YOLO) algorithm is used for object detection and intrusion is decided using our proposed algorithm based on the shifted center of mass of the detected object. Further, Simple Online and Real-time Tracking (SORT) algorithm is used for the tracking of the intruder in real-time. The developed system is also implemented and tested for live video stream using NVIDIA Jetson TX2 development platform with an accuracy of 97% and average fps of 30. Here, the proposed IDS is a generic one where the user can select the region of interest (the area to be intrusion free) of any size and shape from the reference (starting) frame and potential intruders such as a person, vehicle, etc. from the list of trained object classes. Hence, it can have a wide range of smart city applications such as person intrusion free zone, no vehicle entry zone, no parking zone, smart home security, etc.
引用
收藏
页数:6
相关论文
共 17 条
[1]  
Alshamaa D., 2019, 2019 IEEE SENSORS AP, P1
[2]  
Bewley A, 2016, IEEE IMAGE PROC, P3464, DOI 10.1109/ICIP.2016.7533003
[3]  
Chen H, 2016, 2016 9TH INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, BIOMEDICAL ENGINEERING AND INFORMATICS (CISP-BMEI 2016), P23, DOI 10.1109/CISP-BMEI.2016.7852676
[4]  
Crowley J., 2004, 200137540 IST
[5]  
Dehghan A, 2015, PROC CVPR IEEE, P4091, DOI 10.1109/CVPR.2015.7299036
[6]  
Deshmukh R. A., 2018, 2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), P1214, DOI 10.1109/ICECA.2018.8474557
[7]  
Douglass B.P., 2003, Formal Techniques in Real-Time and Fault-Tolerant Systems: 7th International Symposium, FTRTFT 2002, Co-sponsored by IFIP WG 2.2, Oldenburg, Germany, September 9-12, V2469, P53
[8]  
Hariprakash R., 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE 2011), P150, DOI 10.1109/ICCAIE.2011.6162122
[9]  
Kaneda K., 1990, IEEE Computer Applications in Power, V3, P20, DOI 10.1109/67.53225
[10]  
Kongurgsa N, 2017, 2017 10TH INTERNATIONAL CONFERENCE ON UBI-MEDIA COMPUTING AND WORKSHOPS (UBI-MEDIA), P74, DOI 10.1109/UMEDIA.2017.8074077