Border Security Intruder Human Detection Using Image Processing
Border Security Intruder Human Detection Using Image Processing
ISSN No:-2456-2165
Abstract:– This project implements a new defense building our autonomous shooting system.The influence of
mechanism which has a detecting and an aiming unit. The these existing technologies has widened the range for
main objective is to help the armed forces to catch thegrowth of different prototypes for future solutions. The
intruders. The targeting unit has a microcontroller along previous projectsfailures and successes are determined by the
with sensors to detect the presence of humans in researching them for the designof this project which will help
thetargeted area and processes various atmospheric to improve our system[1].
parameters electronically.LASER pointer is used to
B. Title- Intruder tracking using wireless sensor network
determine if the desired target is hit or missed by tracking
In this paper, Target tracking, data processing and
the path of the Laser and determining the point of
analysis play a major role in this type of applications. The
intersection with the LASER. Once the parameters are
proposed system is to develop a centralized computer
obtained are obtained the targeting unit automatically
application that needs to identify moving objects in a specific
positions the gun using its special mechanism.
area using sensors. Human intruders can be detected using this
system. The objective is to design and implement an object
Keywords:- Sensors, Wireless sensor Network, Base Station, tracking system to detect and track objects, and report
Target Tracking, Human Model, Monitoring. direction and speed of the intruder to a central base station.
The human intruder is detected using a passive infrared (PIR)
I. INTRODUCTION sensor. The sensor is connected to a MICA sensor node. The
PIR sensor is able to detect the humans and provide
Ensuring a nation's border is an imperative undertaking information about the direction of the movement. The
for Homeland security. One of the greatest difficulties of gathered information from the sensor network is to be given to
fringe security is to secure sheer extent region of border the base station for processing. The proposed system provides
locales. Nations like India have long land fringes and an environment for easy deployment and which does not
interruption is a long standing issue. Security personals work require any existing infrastructure or constant monitoring by
in round the check and in various landscapes from snow to humans[2].
thick woodland and from sharp slopesto leave. In the day the
visual checking is useful; none the less, it is exceptionally C. Title- Using seismic footstep signatures for
hard to recognize potentialinterlopers or dealers in absolute discriminating of bipeds from quadrapeds
obscurity or in other low-light conditions. Indeed, even Seismic sensors are widely used to detect moving
Europe and USA additionally have comparable interruption targets in the ground sensor network, and can be easily
issues. Security Industry is developing at a fast rate because of employed to discriminate human and quadruped based on
expansion in wrongdoing rate in the previous couple of years. their footstep signatures. Footstep detection and classification
Interruption location gadgets have been utilized widely for is a very challenging problem as a result of the complex
security purposes as a part of request to distinguish the section environmental conditions and non stationary nature of the
of unapproved individual in an ensured zone. Different video seismic signals.[3].
reconnaissance frameworks are introduced with the alert D. Title- A new approach in border security applications
framework at open and private spots. with Camera Detection
In recent years, either in humanitarian aid or border
II. LITERATURE SURVEY security acts, identifying and tracking asylum seekers or
refugees has become a critical problem. In traditional
A. Title- Automated Intruder Detection System Using biometric identification solutions used for person recognition
Camera/Image Capture : in border security or humanitarian aid activities, biometrics
Autonomous shooting system projects have been like face, fingerprint or iris have usually been preferred [4].
previously created andimplemented in the past. The system as
a whole is not a new technology.Various aspects of the system E. Title- Large scale border security systems modeling and
have been done previously for a variety ofreasons, such as the simulation with OPNET
motion tracking and a gun based system that Most aliens who manage to get across borders
executesincoming targets. These were the original and unique undetected are known to end up in cities, and comprise some
technologies that whenintegrated together will help in of the greatest security challenges a country can face.
J. Title- Border Security: Using sequential pattern minning Proposedsystem consists of following parts
using Supplementing Human Intelligence in a Sensor
Network A. Object detection
Sensors are used for achieving border security. These For detecting objects we are using the Histogram of
sensors can also respond to other events triggered due to Oriented Gradients (HOG) descriptor. This method suggested
external factors also called as false alarms. This paper focuses in Histogram of Oriented Gradients for Human Detection
on eliminating false alarms. demonstrated that the HOGimage descriptor and a Linear
Support Vector Machine (SVM) by Dalal and Triggs in their
III. TECHNIQUES seminal 2005, we can use this totrain highly accurate object
classifiers. Thus we are using this descriptor to detect human
A. Motion tracking objects in the video stream
Motion tracking algorithm can be used for detection,
identify and track the object, once the objects within the
image have been detected, the next logical step isto track
those objects. Our algorithm uses the most popular method of
trackingby optical flow. The algorithm is known as the Lucas-
Kanade algorithm, whichis a differential method. In this
method, we give some points to track and wereceive the
optical flow vectors of those points. So applying Lucas-
Kanade there, we get optical flow of the detected object.
VI. ADVANTAGES
VII. CONCLUSION
REFERENCES