Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection

  • Conference paper
  • First Online:
Advanced Information Networking and Applications (AINA 2021)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 225))

Abstract

In this paper we investigate five traditional techniques to extract features within a face image, and we evaluate them by applying the Kernel-based Online Anomaly Detection (KOAD) algorithm. The main objective of this work is to explore the various fundamental feature extraction techniques that can be used to identify whether a person’s face is covered by a mask or not. Although face covering or wearing a mask is recommended during this global COVID-19 pandemic, deliberate face occlusion is considered to be a suspicious activity in a normal scenario. Even during this pandemic, it may be considered suspicious if someone is covering his/her face inside an ATM booth or an apartment complex during odd hours, for instance. Our proposed framework detects such intrusion activity by combining a traditional face detection algorithm with KOAD. Comparative analysis is performed for each filter used and we show that our proposed system achieves high detection accuracy with low computational complexity, while also providing the added benefits of being adaptive, portable, and involving low infrastructural costs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Valera, M., Velastin, S.: A review of the state-of-the-art in distributed surveillance systems. In: Velastin, S., Remagnino, P. (eds.) Intell. Distrib. Video Surveill. Syst., pp. 1–30. Institution of Electrical Engineers, London, UK (2008)

    Google Scholar 

  2. Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. In: Proceedings of the 2001 IEEE Computer Society Conference on Computer Vision and Pattern Recognition. CVPR 2001, Kauai, HI, USA, pp. I (2001). https://doi.org/10.1109/CVPR.2001.990517

  3. Zhang, D.: Wavelet ransform. In: Fundamentals of Image Data Mining. Texts in Computer Science. Springer, Cham (2019)

    Google Scholar 

  4. Bui, L., Tran, D., Huang, X., Chetty, G.: Face recognition based on Gabor features. In: 3rd European Workshop on Visual Information Processing, Paris. France, pp. 264–268 (2011). https://doi.org/10.1109/EuVIP.2011.6045542

  5. Canny, J.: A computational approach to edge detection. In: IEEE Trans Pattern Anal. Mach. Intell. PAMI-8(6), 679–698 (1986). https://doi.org/10.1109/TPAMI.1986.4767851.

  6. Wang, X.: Laplacian operator-based edge detectors. IEEE Trans Pattern Analy. Mach. Intell. 29(5), 886–890 (2007). https://doi.org/10.1109/TPAMI.2007.1027

    Article  Google Scholar 

  7. Kanopoulos, N., Vasanthavada, N., Baker, R.L.: Design of an image edge detection filter using the Sobel operator. IEEE J Solid-State Circ. 23(2), 358–367 (1988). https://doi.org/10.1109/4.996

    Article  Google Scholar 

  8. Ahmed, T., Coates, M., Lakhina, A.: Multivariate online anomaly detection using kernel recursive least squares. In: Proceedings IEEE INFOCOM, Anchorage, AK, USA (2007)

    Google Scholar 

  9. Ahmed, T., Oreshkin, B., Coates, M.: Machine learning approaches to network anomaly detection. In: Proceedings of ACM/USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SysML). Boston MA, USA (2007)

    Google Scholar 

  10. Datakalab. Company Webpage (2016).https://www.datakalab.com/

  11. Chowdary, G.J., Punn, N.S., Sonbhadra, S.K., Agarwal, S.: Face mask detection using transfer learning of inceptionV3. In: Bellatreche, L., Goyal, V., Fujita, H., Mondal, A., Reddy, P.K. (eds) Big Data Analytics. BDA, : Lecture Notes in Computer Science, vol. 12581. Springer, Cham (2020)

    Google Scholar 

  12. Nar, R., Singal, A., Kumar, P.: Abnormal activity detection for bank ATM surveillance. In: 2016 International Conference on Advances in Computing, Communications, and Informatics (ICACCI), Jaipur, India, (2016), pp. 2042–2046.https://doi.org/10.1109/ICACCI.2016.7732351.

  13. Bouchrika, I., Carter, J.N., Nixon, M.S.: Towards automated visual surveillance using gait for identity recognition and tracking across multiple non-intersecting cameras. Multimed. Tools Appl. 75, 1201–1221 (2016). https://doi.org/10.1007/s11042-014-2364-9

    Article  Google Scholar 

  14. Wang, J., Yuan, Y., Gang, Y.: Face Attention Network: An Effective Face Detector for the Occluded Faces. Ar**v abs/1711.07246: n. pag (2017)

    Google Scholar 

  15. Anika, A., Karim, K.L.D., Muntaha, R., Shahrear, F., Ahmed, S., Ahmed, T.: Multi image retrieval for kernel-based automated intruder detection. In: IEEE Region 10 Symposium (TENSYMP). Cochin, India, pp. 1–5 (2017)

    Google Scholar 

  16. Ahmed, T., Pathan, A.K., Ahmed, S: Adaptive algorithms for automated intruder detection in surveillance networks. In: 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI), New Delhi, India, pp. 2775–2780 (2014). https://doi.org/10.1109/ICACCI.2014.6968617

  17. Ahmed, T., Ahmed, S., Ahmed, S., Motiwala, M.: Real-time intruder detection in surveillance networks using adaptive kernel methods. In: 2010 IEEE International Conference on Communications, Cape Town, South Africa, pp. 1–5 (2010)

    Google Scholar 

  18. Au, C., Skaff, S., Clark, J.: Anomaly detection for video surveillance applications. In: Proceedings of IEEE ICPR, Hong Kong, China (2006)

    Google Scholar 

  19. Scholkopf, B., Smola, A.: Learning with Kernels. MIT Press, Cambridge, MA, USA (2001)

    MATH  Google Scholar 

  20. Engel, Y., Mannor, S., Meir, R.: The kernel recursive least squares algorithm. IEEE Trans. Sign. Proc. 52(8), 2275–2285 (2004)

    Article  MathSciNet  Google Scholar 

  21. Georgia Tech Face Database. ftp://ftp.ee.gatech. edu/pub/users/hayes/facedb/

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anik Alvi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alvi, A., Ahmed, T., Uddin, M.F. (2021). Comparative Study of Traditional Techniques for Unsupervised Autonomous Intruder Detection. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-030-75100-5_45

Download citation

Publish with us

Policies and ethics

Navigation