Intrusion detection system based on speckle pattern analysis

被引:0
|
作者
A. Dhall
J. K. Chhabra
N. S. Aulakh
机构
[1] Central Scientific Instruments Organisation,
来源
Experimental Techniques | 2005年 / 29卷
关键词
Speckle; Intrusion; Fiber optic; Security; Image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Buried fiber intrusion detection by calculating the changes in the spatial distribution of energy in the output of a multimode optical fiber has been demonstrated. An analysis and experimental demonstrations of the system have been provided in which we observed that by using the very simple technique of speckle pattern analysis using image processing we could detect various intrusions. The system can be used to detect the passage of vehicles and personnel over buried sensing fibers. The non-electrical nature of the sensor would allow it to be undetectable by the intruder, and the low loss nature of fiber optics would allow the signal processing location to be located at a large distance from the actual sensor. The complete hardware utilized in this effort is one that can be realized at low cost. The same technique can be used in many other sensing applications like temperature sensing, pressure sensing, any kind of vibration sensing etc. Further improvements in the design can be planned using neural network and advanced image processing algorithms such that only human intrusions are separated from other (nuisance) intrusion signals.
引用
收藏
页码:25 / 31
页数:6
相关论文
共 50 条
  • [41] An Intrusion Detection System Based on WiMAX
    Zhou, Bo
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 2448 - 2451
  • [42] Host Based Intrusion Detection System
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND AUTOMATION (CCCA 2011), VOL III, 2010, : 336 - 339
  • [43] HOST BASED INTRUSION DETECTION SYSTEM
    Kothari, Sandip
    Parmar, Hemant
    Das, Eshan
    Panda, Neroja
    Ahmed, Afrin
    Marchang, Jims
    2011 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND TECHNOLOGY (ICMET 2011), 2011, : 875 - 878
  • [44] NetFlow Based Intrusion Detection System
    Wang Zhenqi
    Wang Xinyu
    2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 825 - 828
  • [45] Bayesian based intrusion detection system
    Altwaijry, Hesham
    Algarny, Saeed
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2012, 24 (01) : 1 - 6
  • [46] Review on Intrusion Detection System Based on The Goal of The Detection System
    Khaleel, Mohammad Khamees
    Ismail, Mohd Arfian
    Yunan, Umar
    Kasim, Shahreen
    INTERNATIONAL JOURNAL OF INTEGRATED ENGINEERING, 2018, 10 (06): : 197 - 202
  • [47] Effective intrusion detection model through the combination of a signature-based intrusion detection system and a machine learning-based intrusion detection system
    Weon, Ill-Young
    Song, Doo Heon
    Lee, Chang-Hoon
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2006, 22 (06) : 1447 - 1464
  • [48] Research on Efficient Pattern Matching Algorithms in Intrusion Detection System
    Liu-xiaoxing
    Yu-ning
    2014 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA), 2014, : 509 - 512
  • [49] Design and Implementation of Network Forensic System Based on Intrusion Detection analysis
    Jiang Liu
    Tian Guiyan
    Zhu Shidong
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 689 - 692
  • [50] An intrusion detection method based on system call temporal serial analysis
    Pu, Shi
    Lang, Bo
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF THEORETICAL AND METHODOLOGICAL ISSUES, 2007, 4681 : 656 - +