Tracking of Intruder Using Video Analytics
Tracking of Intruder Using Video Analytics
ISSN No:-2456-2165
Abstract:- Video analytics is a technology that processes a restricted areas, unattended places and in inflated possibility
digital video signal using a special algorithm to perform a security areas [19]. This is an offence, in the event of
security- related function [12]. There is a need to design an Intrusion Identification system, ”watching is trusting”, that is
automated trespass detection and early warning prediction visual perception and Intrusion detection are favor at the same
tool leveraging state-of-the-art machine learning time. In addition, an advantage over further devices like
techniques. Leveraging video surveillance through security microwave Doppler detector provided by the video-based
cameras [3]. In particular, they adopt a CNN-based deep intrusion detection system, infrared detector, magnetic wall,
learning architecture (Faster-RCNN) as the core vibration detector and etc, considering the growing illegal
component of solution. However, these deep learning- activity rate and the availability of powerful general purpose
based methods, while effective, are known to be processors and security cameras [14]at reasonable rates.
computationally expensive and time consuming, especially
when applied to a large amount of surveillance data [3]. Video digital surveillance intelligent protection that can
Given the sparsity of railroad trespassing activity, design a be used as a multi-purpose security device because systems
dual-stage deep learning architecture composed of an are economical, that is the video-based intrusion detection
inexpensive prefiltering stage for activity detection (IDS) system used [5]. This research and product development
followed by a high fidelity trespass detection stage for work is funded financially by an IMPRINT (Grant No.-
robust classification. The former is responsible for filtering 7794/2016) initiative of the Ministry of Human Resource
out frames that show little to no activity, this way reducing Development. Government of India, Secretariat for Housing
the amount of data to be processed by the later more and Urban Affairs, Government of India. The same platform
compute-intensive stage which adopts state-of-the-art that is used for security for other applications. For different
Faster- RCNN to ensure effective classification of applications, different versions of the IDS were suggested.
trespassing activity [3]. no vehicle entry zone, no parking However, these systems lack optimum online performance,
zone, smart home security [14], etc. such as fast , low execution memory, processing speed and
high accuracy [5].
Keywords:- Intruder Tracking, Trespass Detection, Video
Analytics, Security. The goal of this paper is to describe an AI framework
which can analyze live video feeds in real time to gather
I. INTRODUCTION useful information for safety purposes [1]. Specifically, this
study aims to yield the following deliverable:
The fundamental objective of computer vision is to em-
power computers to reproduce the essential elements of 1) To Design and Implement an object tracking system using
human vision, for example, movement recognition and scene Artificial intelligence algorithms [1].
under- standing [2]. To accomplish the objective of quick 2) Applying algorithm on various data sets to analyze the
motion observation, effective work has been done on visual behavior and performance [1].
object tracking. In visual object tracking, the object of interest 3) Identifying and detecting intruders and producing video
is sur- rounded with the bounding rectangular box and the alarm. Figure 1 shows a conceptual view of the system, in
constraints of this box are then estimated for each incoming which an AI algorithm can send live alerts to designated
video frame [2]. Intelligent security systems focused on video personnel by analyzing and identifying trespassing events
surveillance are commonly used to identify suspected crimes in live CCTV feeds. In addition, trespassing events are also
at an early level. This allows real-time sending of intimations recorded in a trespass event database containing video and
and Enables users to take preventive action to minimize the associated metadata [1].
damage. Malicious entry into vulnerable areas, such as
Fig. 4. shows the publishing of live video using Kafka video Fig. 5. shows the detection of object in live video streaming
streaming . with accuracy in percentage.
VI. CONCLUSION
FUTURE WORK