Unauthorized Event Detection System Based on Embedded Image Processing and IoT

International Journal of Electronics and Communication Engineering
© 2019 by SSRG - IJECE Journal
Volume 6 Issue 5
Year of Publication : 2019
Authors : S. Sakthi Sowmya, Dr. D. Jeyakumari
How to Cite?

S. Sakthi Sowmya, Dr. D. Jeyakumari, "Unauthorized Event Detection System Based on Embedded Image Processing and IoT," SSRG International Journal of Electronics and Communication Engineering, vol. 6,  no. 5, pp. 6-8, 2019. Crossref, https://doi.org/10.14445/23488549/IJECE-V6I5P102


Automated Teller Machines (ATMs) security is the field of study that aims at solutions that provide multiple points of protection against physical and electronic theft from ATMs and protecting their installations. From anti-skimming defend systems to silent indicate systems, integrated ATM video surveillance cameras, and ATM monitoring options, security specialists are ready to help people get more out of the ATM security and ATM loss prevention systems. The implementation is achieved with Machine learning, which provides real-time monitoring and control without the need for human intervention. The idea of a pattern matching platform suggests a new system architecture for positioning and monitoring applications with wider coverage and higher communication efficiency. The proposed work aims to implement a low-cost stand-alone Embedded & IOT based on microcontroller and LabVIEW. It offers a robust networking solution with a wide range of application areas over the internet. The Web server can be run on the LabVIEW platform, having limited resources to trigger Google (g-mail). The setup is proposed for ATM security, which comprises the authentication of the shutter lock module, web-enabled control, sensors, and camera control.


LabVIEW, IoT, Arduino UNO, IR Sensor.


[1] S.Ganesh Prabhu, K. Vinotha, M. Shanthala, S. Subhashini, S. Vishnu, “IOT Based Home Automation and Security System”, SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE), vol. 4, no. 3, pp. 19-22, 2017.
[2] Ganesh Prabhu.S, Sangeetha.S, Shanmathi.S, Sharmila.M, “Automatic Toll E-Ticketing for Transportation Systems” SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE), vol. 4, no. 3, pp. 05-08, 2017.
[3] Ganesh Prabhu.S, R.R.Thirrunavukkarasu, S.Logesh Kumar, Karthik.S “Big Data Prologue Linking Cloud Computing to Ascertain the Smart Polling” International Journal of Current Engineering and Scientific Research ISSN (Print): 2393-8374, (Online): 2394-0697, Volume-4, Issue-9, 2017.
[4] Ganesh Prabhu.S, R.R.Thirrunavukkarasu, S.Logesh Kumar, Karthik.S “Lowering Glucose Elevations using Smart Head-on conjunction through virtual Congruence of Cloud on
Internet” International Journal of Engineering Research in Computer Science and Engineering (IJERCSE) Vol 4, Issue 10, October 2017
[5] J Burns, Member, IEEE, C Steer, M Stapleton, S Quillin, J Boakes, C Eldridge, C Grove, G Chapman and A Lohstroh “Portable Muon Scattering Tomography Detectors for Security Imaging Applications”.
[6] X. Chen, X. Li, H. Wu, and T. Qiu, “Real-time object tracking via cam shift-based robust framework,” 2012 IEEE International Conference on Information Science and Technology, March 2012, pp. 527–530.
[7] B. Deori and D. M. Thounaojam, “A survey on moving object tracking in video,” International Journal on Information Theory (IJIT), vol. 3, no. 3, pp. 31–46, 2014.
[8] Y. Habibi, D. R. Sulistyaningrum, and B. Setiyono, “A new algorithm for small object tracking based on super-resolution technique,” AIP Conference Proceedings, vol. 1867, no. 1, p. 020024, 2017.
[9] Harris C. & Stennett C. “Rapid - A Video Rate Object Tracker”, Proc. British Machine Vision Conference, BMVC-90, Oxford, pp.73-77, 1990.
[10] M. Isard and A. Blake, “Contour Tracking By Stochastic Propagation of Conditional Density,” In Proc. European Conf. Computer Vision, pp. 343-356, 1996.
[11] Jie Wang, K.N. Plataniotis, A.N. Venetsanopoulos, “Selecting discriminant eigenfaces for face recognition”, Pattern Recognition Letters 26 (2005), science direct.
[12] Kresimir Delac and Mislav Grgic,“Face recognition”, I-TECH Education and Publishing, Vienna, Austria,2007.
[13] Kwang-Eun Ko, Kwee-Bo Sim “Deep convolutional framework for abnormal behavior detection in a smart surveillance system”, School of Electrical and Electronics Engineering, Chung-Ang University, 84, Heukseok-ro, Dongjak-gu, Seoul, 06974, Republic of Korea.
[14] U.L. MeMakin, D.M. Shccn, 1I.U. Collins, T,E. Hall mid R.H. Scvcrtscn, Junc 1995, “Widcband, Millimetcr-Wavc, Holngrnptiic Wcxpons Survcillance Sys tcms”, OU HOYI’O Symposium on taw Llnfurccment Teclmologics: Irlcntilicatiori Tcclinologics and Traflic Safely, Muiiicli, Germany.
[15] P. Salesmbier, L. Torres, F. Meyer, and C. Gu, “Region-based Video Coding Using Mathematical Morphology,” Proc. of the IEEE, Vol. 83, No. 6, pp. 843-857, 1995.
[16] D.M. Shecn, D.L. McMnkin, 11.U. Collins, T.E. Halland R.H. Sevcrtscii, 1996, “Cont;e&xl Explosivc Dctcctim on Personnel Using n Widebnnrl Holographic Millimeter-Wave Imaging Systcni”, AERO SENSE AcrnspacclDcfcnsc Sensing nrld Colitrols, Orlatirlo, Fin USA, Proceedings of ttic SFIC, Vol. 275.
[17] M.Turk. and A.Pentland., “Face recognition using eigenfaces”, Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, Maui, Hawaii, pp. 586-591, 3-6 June 1991.
[18] WeilongChen, MengJooEr, “Illumination Compensation and Normalization for Robust FaceRecognition Using Discrete Cosine Transform in Logarithm Domain,” IEEE Transactions On Systems, Man And Cybernetics, Vol.36, No.2, April 2006.
[19] Shruthi. K and Ramaprasad. P, “Design of a prototype to detect mobile phone usage in restricted areas” SSRG International Journal of Electronics and Communication Engineering 2.12 (2015): 10-15.
[20] Piyush Kiran Redgaonkar, Ajinkya Prakash Sonar, Amit Sunil Tatar, R. Bhambhare, “Paper Title” SSRG International Journal of Electrical and Electronics Engineering 3.3 (2016): 16-18.
[21] D.Sangavi and N.Rajagopal, “Velocity regulator of AC motor with V/F controller” SSRG International Journal of VLSI & Signal Processing 3.3 (2016): 22-26.