Intrusion detection system based on speckle pattern analysis

被引:0
作者
A. Dhall
J. K. Chhabra
N. S. Aulakh
机构
[1] Central Scientific Instruments Organisation,
来源
Experimental Techniques | 2005年 / 29卷
关键词
Speckle; Intrusion; Fiber optic; Security; Image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Buried fiber intrusion detection by calculating the changes in the spatial distribution of energy in the output of a multimode optical fiber has been demonstrated. An analysis and experimental demonstrations of the system have been provided in which we observed that by using the very simple technique of speckle pattern analysis using image processing we could detect various intrusions. The system can be used to detect the passage of vehicles and personnel over buried sensing fibers. The non-electrical nature of the sensor would allow it to be undetectable by the intruder, and the low loss nature of fiber optics would allow the signal processing location to be located at a large distance from the actual sensor. The complete hardware utilized in this effort is one that can be realized at low cost. The same technique can be used in many other sensing applications like temperature sensing, pressure sensing, any kind of vibration sensing etc. Further improvements in the design can be planned using neural network and advanced image processing algorithms such that only human intrusions are separated from other (nuisance) intrusion signals.
引用
收藏
页码:25 / 31
页数:6
相关论文
共 50 条
  • [31] An intrusion detection and prevention system for IMS and VoIP services
    Nikos Vrakas
    Costas Lambrinoudakis
    International Journal of Information Security, 2013, 12 : 201 - 217
  • [32] Research on Intrusion Detection System Based on Host Information Recognition
    Sui, Xin
    PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MECHANICAL ENGINEERING (EMIM 2017), 2017, 76 : 481 - 483
  • [33] Application and optimization of intrusion detection system based on Artificial Intelligence
    Zhu, Kaidi
    Wu, Xiangwen
    Yu, Sun
    Huo, Da
    Li, Rui
    Pei, Xikai
    PROCEEDINGS OF 2020 IEEE 2ND INTERNATIONAL CONFERENCE ON CIVIL AVIATION SAFETY AND INFORMATION TECHNOLOGY (ICCASIT), 2020, : 1053 - 1058
  • [34] An intrusion detection and prevention system for IMS and VoIP services
    Vrakas, Nikos
    Lambrinoudakis, Costas
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (03) : 201 - 217
  • [35] A survey of cloud-based network intrusion detection analysis
    Keegan, Nathan
    Ji, Soo-Yeon
    Chaudhary, Aastha
    Concolato, Claude
    Yu, Byunggu
    Jeong, Dong Hyun
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2016, 6
  • [36] Descriptive Analysis of Hash Table Based Intrusion Detection Systems
    Raj, Saumya
    Rajesh, R.
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON DATA MINING AND ADVANCED COMPUTING (SAPIENCE), 2016, : 233 - 240
  • [37] Microsaccades Tracking by Secondary Speckle Pattern Analysis
    Shteinberg, Ola
    Agdarov, Sergey
    Beiderman, Yafim
    Bonneh, Yoram S.
    Ziv, Inbal
    Zalevsky, Zeev
    JOURNAL OF BIOPHOTONICS, 2024,
  • [38] Analysis and mathematical justification of a fitness function used in an intrusion detection system
    Diaz-Gomez, Pedro A.
    Hougen, Dean F.
    GECCO 2005: Genetic and Evolutionary Computation Conference, Vols 1 and 2, 2005, : 1591 - 1592
  • [39] Application of software fault tree method in intrusion detection system analysis
    Yuan, J
    Long, Y
    Hu, CH
    Huang, Y
    ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 7, 2005, : 481 - 486
  • [40] Tier-Based Optimization for Synthesized Network Intrusion Detection System
    Siddiqi, Murtaza Ahmed
    Pak, Wooguil
    IEEE ACCESS, 2022, 10 : 108530 - 108544