Implementation of Automatic Video Based Abnormal Event Detection and Alert System for Security

نویسندگان

  • V. S. Rasmi
  • V. S. RASMI
  • K. R. VINOTHINI
چکیده

225 ABSTRACT The usage of surveillance camera system is increased nowadays because of increase in crime activities. To reduce such crime activities processing of videos involved in such activities is necessary. The proposed system is to detect the unusual event which occurs in the ATM centre. The video recorded in the surveillance camera is processed to identify the unusual event. In case of occurrence of unusual activity the beep sound will occur from the buzzer and the GSM modem will send the message to the authority. The entire processing of the recorded video sequence is done in Matlab software. The unusual output generated from the software is sent to the GSM modem to distribute the information to the concerned person or the concerned authority.The application of this proposed method is to enhance the ATM security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real-Time intrusion detection alert correlation and attack scenario extraction based on the prerequisite consequence approach

Alert correlation systems attempt to discover the relations among alerts produced by one or more intrusion detection systems to determine the attack scenarios and their main motivations. In this paper a new IDS alert correlation method is proposed that can be used to detect attack scenarios in real-time. The proposed method is based on a causal approach due to the strength of causal methods in ...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

Improving Indoor Security Surveillance by Fusing Data from Bim, Uwb and Video

Indoor physical security, as a perpetual and multi-layered phenomenon, is a timeintensive and labor-consuming task. Various technologies have been leveraged to develop automatic access control, intrusion detection, or video monitoring systems. Video surveillance has been significantly enhanced by the advent of Pan-Tilt-Zoom (PTZ) cameras and advanced video processing, which together enable effe...

متن کامل

Using a Deep Understanding of Network Activities for Security Event Management

With the growing deployment of host-based and network-based intrusion detection systems in increasingly large and complex communication networks, managing low-level alerts from these systems becomes critically important. Probes of multiple distributed firewalls (FWs), intrusion detection systems (IDSs) or intrusion prevention systems (IPSs) are collected throughout a monitored network such that...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016