Automated secure room system

Md Hazrat Ali, Fadhlan Kamaruzaman, Md Arafatur Rahman, Amir Akramin Shafie

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

Automated security systems are a useful addition for today's home where safety is essential. Vision-based security systems have the greater advantages over the traditional security systems such as using the lock, observing by the security guard, using alarm signal etc. This paper proposed an integrated dual-level vision-based home security system, which consists of two subsystems - a) movement detection and b) hand verification system. The primary movement detection technique is used to detect any movement first and the system verifies the authorized person for any secured place. It will check the threshold value where if the threshold level exceeds and the verification flag is off, the alarm will be triggered. Otherwise, if verification flag is on, it means the person is authorized and movement detection will be turned off for this person. On an event of a failure in the primary system, the secondary hand geometry verification module can act as a reliable backup to detect authorized person in a restricted area. Several experiment results have shown good performance and feasible implementation in both cases.

Original languageEnglish
Title of host publication2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages73-78
Number of pages6
ISBN (Print)9781467367226
DOIs
Publication statusPublished - Nov 20 2015
Event4th International Conference on Software Engineering and Computer Systems, ICSECS 2015 - Kuantan, Pahang, Malaysia
Duration: Aug 19 2015Aug 21 2015

Other

Other4th International Conference on Software Engineering and Computer Systems, ICSECS 2015
CountryMalaysia
CityKuantan, Pahang
Period8/19/158/21/15

Fingerprint

Security systems
Geometry
Experiments

Keywords

  • hand geometry verification
  • human verification
  • motion detection
  • optical flow
  • Room alarming system

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Software

Cite this

Ali, M. H., Kamaruzaman, F., Rahman, M. A., & Shafie, A. A. (2015). Automated secure room system. In 2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data (pp. 73-78). [7333086] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSECS.2015.7333086

Automated secure room system. / Ali, Md Hazrat; Kamaruzaman, Fadhlan; Rahman, Md Arafatur; Shafie, Amir Akramin.

2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data. Institute of Electrical and Electronics Engineers Inc., 2015. p. 73-78 7333086.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ali, MH, Kamaruzaman, F, Rahman, MA & Shafie, AA 2015, Automated secure room system. in 2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data., 7333086, Institute of Electrical and Electronics Engineers Inc., pp. 73-78, 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015, Kuantan, Pahang, Malaysia, 8/19/15. https://doi.org/10.1109/ICSECS.2015.7333086
Ali MH, Kamaruzaman F, Rahman MA, Shafie AA. Automated secure room system. In 2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data. Institute of Electrical and Electronics Engineers Inc. 2015. p. 73-78. 7333086 https://doi.org/10.1109/ICSECS.2015.7333086
Ali, Md Hazrat ; Kamaruzaman, Fadhlan ; Rahman, Md Arafatur ; Shafie, Amir Akramin. / Automated secure room system. 2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 73-78
@inproceedings{ed26effcbc2749f5b076aad1fdd8a596,
title = "Automated secure room system",
abstract = "Automated security systems are a useful addition for today's home where safety is essential. Vision-based security systems have the greater advantages over the traditional security systems such as using the lock, observing by the security guard, using alarm signal etc. This paper proposed an integrated dual-level vision-based home security system, which consists of two subsystems - a) movement detection and b) hand verification system. The primary movement detection technique is used to detect any movement first and the system verifies the authorized person for any secured place. It will check the threshold value where if the threshold level exceeds and the verification flag is off, the alarm will be triggered. Otherwise, if verification flag is on, it means the person is authorized and movement detection will be turned off for this person. On an event of a failure in the primary system, the secondary hand geometry verification module can act as a reliable backup to detect authorized person in a restricted area. Several experiment results have shown good performance and feasible implementation in both cases.",
keywords = "hand geometry verification, human verification, motion detection, optical flow, Room alarming system",
author = "Ali, {Md Hazrat} and Fadhlan Kamaruzaman and Rahman, {Md Arafatur} and Shafie, {Amir Akramin}",
year = "2015",
month = "11",
day = "20",
doi = "10.1109/ICSECS.2015.7333086",
language = "English",
isbn = "9781467367226",
pages = "73--78",
booktitle = "2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
address = "United States",

}

TY - GEN

T1 - Automated secure room system

AU - Ali, Md Hazrat

AU - Kamaruzaman, Fadhlan

AU - Rahman, Md Arafatur

AU - Shafie, Amir Akramin

PY - 2015/11/20

Y1 - 2015/11/20

N2 - Automated security systems are a useful addition for today's home where safety is essential. Vision-based security systems have the greater advantages over the traditional security systems such as using the lock, observing by the security guard, using alarm signal etc. This paper proposed an integrated dual-level vision-based home security system, which consists of two subsystems - a) movement detection and b) hand verification system. The primary movement detection technique is used to detect any movement first and the system verifies the authorized person for any secured place. It will check the threshold value where if the threshold level exceeds and the verification flag is off, the alarm will be triggered. Otherwise, if verification flag is on, it means the person is authorized and movement detection will be turned off for this person. On an event of a failure in the primary system, the secondary hand geometry verification module can act as a reliable backup to detect authorized person in a restricted area. Several experiment results have shown good performance and feasible implementation in both cases.

AB - Automated security systems are a useful addition for today's home where safety is essential. Vision-based security systems have the greater advantages over the traditional security systems such as using the lock, observing by the security guard, using alarm signal etc. This paper proposed an integrated dual-level vision-based home security system, which consists of two subsystems - a) movement detection and b) hand verification system. The primary movement detection technique is used to detect any movement first and the system verifies the authorized person for any secured place. It will check the threshold value where if the threshold level exceeds and the verification flag is off, the alarm will be triggered. Otherwise, if verification flag is on, it means the person is authorized and movement detection will be turned off for this person. On an event of a failure in the primary system, the secondary hand geometry verification module can act as a reliable backup to detect authorized person in a restricted area. Several experiment results have shown good performance and feasible implementation in both cases.

KW - hand geometry verification

KW - human verification

KW - motion detection

KW - optical flow

KW - Room alarming system

UR - http://www.scopus.com/inward/record.url?scp=84962110146&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84962110146&partnerID=8YFLogxK

U2 - 10.1109/ICSECS.2015.7333086

DO - 10.1109/ICSECS.2015.7333086

M3 - Conference contribution

SN - 9781467367226

SP - 73

EP - 78

BT - 2015 4th International Conference on Software Engineering and Computer Systems, ICSECS 2015: Virtuous Software Solutions for Big Data

PB - Institute of Electrical and Electronics Engineers Inc.

ER -