0% found this document useful (0 votes)
196 views3 pages

Border Security Intruder Human Detection Using Image Processing

This project implements a new defense mechanism which has a detecting and an aiming unit. The main objective is to help the armed forces to catch intruders. The targeting unit has a microcontroller along with sensors to detect the presence of humans in thetargeted area and processes various atmospheric parameters electronically.LASER pointer is used to determine if the desired target is hit or missed by tracking the path of the Laser and determining the point of intersection with the LASER. Once the parameters are obtained are obtained the targeting unit automatically positions the gun using its special mechanism.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
196 views3 pages

Border Security Intruder Human Detection Using Image Processing

This project implements a new defense mechanism which has a detecting and an aiming unit. The main objective is to help the armed forces to catch intruders. The targeting unit has a microcontroller along with sensors to detect the presence of humans in thetargeted area and processes various atmospheric parameters electronically.LASER pointer is used to determine if the desired target is hit or missed by tracking the path of the Laser and determining the point of intersection with the LASER. Once the parameters are obtained are obtained the targeting unit automatically positions the gun using its special mechanism.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Volume 3, Issue 5, May – 2018 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Border Security: Intruder Human Detection using


Image Processing
1
Virendra Panchal, 2Harshal Dimble, 3Sandesh Nikam, 4Shivraj Kamatgi
1
BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India
2
BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India
3
BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India
4
BE Student, Dept. of Computer Engineering, KJCOEMR, Pune, India
Prof .Mayuri Sadaphle, Dept. of Computer Engineering, KJCOEMR, Pune, India

Abstract:– This project implements a new defense building our autonomous shooting system.The influence of
mechanism which has a detecting and an aiming unit. The these existing technologies has widened the range for
main objective is to help the armed forces to catch thegrowth of different prototypes for future solutions. The
intruders. The targeting unit has a microcontroller along previous projectsfailures and successes are determined by the
with sensors to detect the presence of humans in researching them for the designof this project which will help
thetargeted area and processes various atmospheric to improve our system[1].
parameters electronically.LASER pointer is used to
B. Title- Intruder tracking using wireless sensor network
determine if the desired target is hit or missed by tracking
In this paper, Target tracking, data processing and
the path of the Laser and determining the point of
analysis play a major role in this type of applications. The
intersection with the LASER. Once the parameters are
proposed system is to develop a centralized computer
obtained are obtained the targeting unit automatically
application that needs to identify moving objects in a specific
positions the gun using its special mechanism.
area using sensors. Human intruders can be detected using this
system. The objective is to design and implement an object
Keywords:- Sensors, Wireless sensor Network, Base Station, tracking system to detect and track objects, and report
Target Tracking, Human Model, Monitoring. direction and speed of the intruder to a central base station.
The human intruder is detected using a passive infrared (PIR)
I. INTRODUCTION sensor. The sensor is connected to a MICA sensor node. The
PIR sensor is able to detect the humans and provide
Ensuring a nation's border is an imperative undertaking information about the direction of the movement. The
for Homeland security. One of the greatest difficulties of gathered information from the sensor network is to be given to
fringe security is to secure sheer extent region of border the base station for processing. The proposed system provides
locales. Nations like India have long land fringes and an environment for easy deployment and which does not
interruption is a long standing issue. Security personals work require any existing infrastructure or constant monitoring by
in round the check and in various landscapes from snow to humans[2].
thick woodland and from sharp slopesto leave. In the day the
visual checking is useful; none the less, it is exceptionally C. Title- Using seismic footstep signatures for
hard to recognize potentialinterlopers or dealers in absolute discriminating of bipeds from quadrapeds
obscurity or in other low-light conditions. Indeed, even Seismic sensors are widely used to detect moving
Europe and USA additionally have comparable interruption targets in the ground sensor network, and can be easily
issues. Security Industry is developing at a fast rate because of employed to discriminate human and quadruped based on
expansion in wrongdoing rate in the previous couple of years. their footstep signatures. Footstep detection and classification
Interruption location gadgets have been utilized widely for is a very challenging problem as a result of the complex
security purposes as a part of request to distinguish the section environmental conditions and non stationary nature of the
of unapproved individual in an ensured zone. Different video seismic signals.[3].
reconnaissance frameworks are introduced with the alert D. Title- A new approach in border security applications
framework at open and private spots. with Camera Detection
In recent years, either in humanitarian aid or border
II. LITERATURE SURVEY security acts, identifying and tracking asylum seekers or
refugees has become a critical problem. In traditional
A. Title- Automated Intruder Detection System Using biometric identification solutions used for person recognition
Camera/Image Capture : in border security or humanitarian aid activities, biometrics
Autonomous shooting system projects have been like face, fingerprint or iris have usually been preferred [4].
previously created andimplemented in the past. The system as
a whole is not a new technology.Various aspects of the system E. Title- Large scale border security systems modeling and
have been done previously for a variety ofreasons, such as the simulation with OPNET
motion tracking and a gun based system that Most aliens who manage to get across borders
executesincoming targets. These were the original and unique undetected are known to end up in cities, and comprise some
technologies that whenintegrated together will help in of the greatest security challenges a country can face.

IJISRT18MY484 www.ijisrt.com 309


Volume 3, Issue 5, May – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
Effective border detection systems can help inreal time border numerous applications such as the monitoring of wildlife,
security integrity.[5]. border security, industries etc.[1].
F. Title- Field trial of the first photonic-based radar for A. Following are the requirements of the detection system
maritime border security and harbor protection
The field trial results of the first photonics-based radar  The camera was the firm factor to detect the intruder as
system in a real maritime environment are presented in this enters in the surveillance, functional parts of the camera
paper. The system allows increased performance and an locating the intruder.
unprecedented potential flexibility by sending and detecting
Radar Signals.[6].  In current system the need of the human for the particular
action to be performed on the Intruder.
G. Title- A Model-Based Approach to Predicting the
Performance of Insider Threat Detection Systems  The system should have the prime factor to deal with the
The confusion matrix is presented to verify whether the environment in the circumference, optional technology
intruder is insider or not. To evaluate a predictive model, will get the use of the surveillance.
datasets are used which include injected insiders. [7].  The Intruder detection helps to reduce the Causality on
H. Title- Smart Surveillance Security &Monitoring System the Border and might get the system optional retrieval.
Using Raspberry PI
This paper helps in the designing and implementation  Architecture
of Smart surveillance monitoring system using Raspberry Pi
and PIR sensor for mobile devices. It increases the usage of
mobile technology to provide essential security to our homes
and for other control applications .It has human detection and
smoke detection capability that can provide precaution to
potential crimesand potential fire. The credit card size
Raspberry Pi (RPI) with Open Source Computer Vision (Open
CV) software handles the image processing, control
algorithms for thealarms and sends captured pictures to user’s
email via Wi-Fi. [8].

I. Title-Social Simulations for Border Security


In this paper, the interactions among border security
forces, smugglers and population are incorporated in social,
cultural and organizational aspects and represent mobile
sensor and surveillance network.[9]. V. PROPOSED SYSTEM

J. Title- Border Security: Using sequential pattern minning  Proposedsystem consists of following parts
using Supplementing Human Intelligence in a Sensor
Network A. Object detection
Sensors are used for achieving border security. These For detecting objects we are using the Histogram of
sensors can also respond to other events triggered due to Oriented Gradients (HOG) descriptor. This method suggested
external factors also called as false alarms. This paper focuses in Histogram of Oriented Gradients for Human Detection
on eliminating false alarms. demonstrated that the HOGimage descriptor and a Linear
Support Vector Machine (SVM) by Dalal and Triggs in their
III. TECHNIQUES seminal 2005, we can use this totrain highly accurate object
classifiers. Thus we are using this descriptor to detect human
A. Motion tracking objects in the video stream
Motion tracking algorithm can be used for detection,
identify and track the object, once the objects within the
image have been detected, the next logical step isto track
those objects. Our algorithm uses the most popular method of
trackingby optical flow. The algorithm is known as the Lucas-
Kanade algorithm, whichis a differential method. In this
method, we give some points to track and wereceive the
optical flow vectors of those points. So applying Lucas-
Kanade there, we get optical flow of the detected object.

IV. EXISTING SYSTEM


WSN gained popularity in the last decade due to their
ability to connect physical and digital world. WSNs have
quickly become popular due to their low cost solutions to
verify real world challenges. Currently, WSN is applied in

IJISRT18MY484 www.ijisrt.com 310


Volume 3, Issue 5, May – 2018 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
B. Motion tracking FPGA platform." Advanced Technologies for
Once the objects within the image have been detected, Communications (ATC), 2013 International Conference
the next logical step is totrack those objects. Our algorithm on. IEEE, 2013.
uses the most popular method of tracking by optical flow. The [3]. NavneetDalal and BillTriggs, “Histograms ofOriented
algorithm is known as the Lucas-Kanade algorithm, which isa Gradients forHuman Detection.”
differential method. In this method, we give some points to Available:https://lear.inrialpes.fr/people/triggs/pubs/Dalal
track and we receivethe optical flow vectors of those points. -cvpr05.pdf.
We getoptical flow of the detected object using Lucas – [4]. Bruce D. Lucas and TakeoKanade, “An Iterative
Kanade. ImageRegistration Technique with an
ApplicationtoStereoVision.”Available:http://wwwcse.ucs
C. Color detection d.edu/classes/sp02/cse252/lucaskanade81.pdf.
The system will be able to differentiate between allied [5]. The Sentry Project. Web. 03Dec. 2011.
targets and enemy targets by detecting colours. We use HSV Available:http://www.paintballsentry.com.
instead of RGB to detect colors. [6]. Autonomous Targeting System.
Available:http://www.eecs.ucf.edu/seniordesign/fa2011sp
The primary benefit of a pixel represented by HSV is that 2012/g12/.
it would be relativelyeasy to detect the various shades of a [7]. Self-Targeting Automated Turret System.
single color. This method gives you a nicebinary image that Available:http://www.eecs.ucf.edu/seniordesign/sp2014s
displays the specified color as white with all other objects u2014/g08/home.html
andcolors on the screen as black. By specifying a certain
range of color to represent anallied target, the system will be
able to calculate the average color of the target.

VI. ADVANTAGES

 System will be safe and reliable for military and


lawenforcement use.
 Al low-cost robotic device.
 The device can interact without human presence.

VII. CONCLUSION

As we conclude here, implemented the system for


reducing the causality for the men on border, efficient security
system that automatically detects the intruder and response
accordingly. The security is been based on the automation
without any human interaction.

REFERENCES

[1]. Gu, Yi, et al. “Home Security usingUPnP-Based


Surveillance Camera System." Information Science and
Applications (ICISA), 2013 International Conference on.
IEEE, 2013.
[2]. Van ThanhTrung, Bui, and Nguyen Van Cuong.
"Monitoring and controlling devices system by GPRS on

IJISRT18MY484 www.ijisrt.com 311

You might also like