ML (1) CD
ML (1) CD
Action Recognition
Sairaj P. Rajput Vilas B. Rabad
[email protected] [email protected]
I. INTRODUCTION
Abstract—
In the current scenario, security is an
The growth of smart surveillance systems has essential aspect of our daily lives. However,
become necessary in recent years to guarantee the
security and safety of different surroundings. This many households find traditional security
study provides a novel way to machine learning- camera systems to be cost-prohibitive. To
integrated smart security surveillance using Python address this issue, this work focuses on
and related modules. Action and facial recognition presenting a solution that is both cost-effective
are among the system's primary functions. and incorporates facial and action recognition
Convolutional Neural Networks (CNN) are utilized
for reliable and effective identification procedures.
systems.
The work suggested, the solution improves The work proposes the introduction of a
performance and accuracy in real-time security surveillance system capable of
surveillance scenarios by utilizing the robust recognizing both the actions of intruders and
machine learning algorithms combined with the faces of individuals. Upon detection, the
Python's ecosystem, which includes libraries like system will promptly notify the owner,
TensorFlow, OpenCV, and Keras. The system
improves its recognition skills through ongoing providing real-time updates on the actions
learning and adaptation, which helps it recognize performed by the intruder.
intricate movements and recognize people in To achieve this, the dataset is developed and
observed situations. employs technologies such as Mediapipe,
Additionally, by allowing the system to promptly CNNs (Convolutional Neural Networks), and
send alerts and notifications to specific recipients other Python modules. Mediapipe is utilized
in the event of detected security breaches or
suspicious activity, the integration of Twilio API for extracting landmarks from body postures,
promotes seamless communication. This feature which are then used to predict the position of
improves the system's ability to respond quickly individuals.
and effectively to possible security threats. The main objective of the work is to offer a
cost-effective, user-friendly system capable of
Keywords: Python, Machine learning, facial and action recognition, adaptable to
CNN, Twilio API, Open-CV, LBPH,
Mediapipe,ANN. various scenarios and environments.
II. LITERATURE SURVEY
The system described in this work uses the contingent upon the size and quality of the
GSM system for messaging services. For camera’s frame.[3]
intruder detection this work implements the
This study aims in developing the system
hardware components like sensors,Sim900
which aims in providing the home security
GRPS/GSM Module. The system is very
surveillance system. The project possesses a
beneficial for people who want to safeguard
distinct advantage in terms of time and
their properties and restrict access. This system
efficiency compared to similar systems
is very affordable and easily operated, so that
discussed. Unlike conventional surveillance
anybody whether rich or comfortable, young or
systems where all recorded videos must be
old can make use of this system. But this
manually reviewed to identify intrusions, the
system has the drawback when there is no
proposed system offers immediate detection.
network in such situations this system will fail.
This is facilitated by the generation of an email
[1]
for the user, containing vital information such
The work introduces a security monitoring as the time of intrusion and accompanying
system leveraging IoT (Internet of Things) images. Furthermore, the proposed system is
technology. The system comprises Raspberry designed to minimize false alarms by adjusting
Pi 3, Arduino, PIR sensor, webcam, and a the threshold pixel value of intruder images.
buzzer. Notably, the novelty of this system lies Users also benefit from the ability to observe
in its incorporation of human detection intrusions in real-time through live video,
capability through the use of the Histogram of enhancing the overall outcome of the
Oriented Gradients (HOG) and Support Vector project.[4]
Machine (SVM) methods, with the buzzer
The system outlined in this work integrates
serving as a warning mechanism for the
PIR sensors, RFID technology, Arduino
homeowner.
microcontrollers, and hazard lights, in addition
Simulation results demonstrate that the to OpenCV integration. Specifically, the
system can swiftly detect intruders within system utilizes the Haar Cascade Frontal Face
seconds, achieving an accuracy of 90% with a Detection algorithm for facial recognition.
processing time of approximately 2 seconds.
This comprehensive system aids in the
The work suggests that future research will
detection of potential culprits and promptly
delve into exploring alternative feature
sends images to the system owners, facilitating
extraction and classification methods aimed at
immediate action. Its versatility allows for
further enhancing the accuracy of intruder
implementation in various settings, including
detection.[2]
home security and secure locations such as
The study presents a system featuring a banks and jewelry shops.[5]
Graphical User Interface (GUI) and achieving a
The work describes how the system operates
remarkable accuracy of 94.5% in face
by detecting the motion of intruders through
recognition. Initially, users are required to
PIR sensors, capturing their images
input individual data, allowing the model to
accordingly. Leveraging the Haar Cascade
undergo training. Subsequently, the system
algorithm enhances computational efficiency
utilizes this data to recognize individuals. It’s
and accuracy in human face detection and
noted that the accuracy of the system is
recognition. Remarkably, the system achieves
an image processing rate of approximately 28 This work uses ESP32-CAM module which
images per second for the entire process. offers a versatile solution for animal intrusion
Utilizing IoT technology, the system detection, applicable across various sectors. It
promptly sends alert emails to the owner, promises to enhance wildlife preservation,
containing the latest captured image of the protect agricultural assets, fortify property
intruder. This low-cost solution proves to be security, prevent infrastructure damage, and
fast, highly accurate, and efficient in providing support environmental research. Despite its
alerts, effectively serving as a monitoring advantages, such as cost-effectiveness and
system. Its convenience makes it adept at scalability, addressing limitations like detection
addressing security concerns, ultimately range and weather sensitivity is crucial. With
contributing to the reduction or prevention of careful planning and optimization, this
break-ins.[6] technology can significantly contribute to
safeguarding assets and preserving wildlife and
ecosystems.[7]
V. RESULT
A. Action Recognition Model: Fig. 6. Testing of face recognition model
The action recognition model achieved the
accuracy of 93.00% accuracy and testing
accuracy of 93.07% as shown in Fig.4. The
model trained with 200 epochs, 16 batch size. C. Message Sending API:
You can see the result as shown in Fig. 5.
If all models show positive results then the
system sends SMS to the owner mobile
number as shown on Fig. 7. This system uses
Twilio API for sending messages regarding
changes in camera configuration and changes
in base frame.
Fig. 4. Metrics
[2] Nico Surantha and Wingky R.
Wicaksono, “An IoT based House Intruder
Detection and Alert System using Histogram of
Oriented Gradients”, Jakarta 11480, Indonesia,
DOI:10.3844/jcssp.2019.1108.1122