Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Automated Cam Security Using Image Comparison


Affiliations
1 Holy Mary Institute of Technology and Science, Bogaram-501301 (V), Keesara (M), R.R (D), India
2 Holy Mary Institute of Technology and Science, Bogaram-501301 (V), Keesara (M), R.R (D)
3 Holy Mary Institute Technology & Science, Bogaram, R.R. District, A.P, India
     

   Subscribe/Renew Journal


In the corporate world, various aspects of security have been changing in the course of time, addressed separately and notably by distinct and often non-communicating departments for IT security and fraud prevention. Today there is a greater recognition of the interconnected nature of security requirements, an approach variously known as holistic security, "all hazards" management, and other terms. Standard (ISO 28000) specifies the requirements for a security management system, including those aspects critical to security assurance for any organization or enterprise wishing to manage the security of the organization and its activities.
Automated Cam security deals with the real-time surveillance of restricted areas. ACS can reduce the human workload by the concept of image comparison. Initially a reference image would be saved in the database, and then cam will click images in regular interval of time, to compare these with the reference image. If any difference is found in between the compared images, then an alarm is raised to the directive personal regarding the security breach.
The environment in which ACS operates includes highly restricted places like sector 7, nuclear research and development centre, bank lockers with high security etc (where human entry is prohibited). ACS can be embedded onto a chip and can be independently used along with a cam. This integrated system can be used to notify us the alerts wirelessly. By using ACS i.e. security through cam would lead work to be minimized at the apex level.

Keywords

Live Image, Reference Image (Breach Free), Automatic Dispose, ACS-Automated Cam Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 273

PDF Views: 4




  • Automated Cam Security Using Image Comparison

Abstract Views: 273  |  PDF Views: 4

Authors

A. Vimal Kumar
Holy Mary Institute of Technology and Science, Bogaram-501301 (V), Keesara (M), R.R (D), India
D. Avinash
Holy Mary Institute of Technology and Science, Bogaram-501301 (V), Keesara (M), R.R (D)
S. China Venkateshwaralu
Holy Mary Institute Technology & Science, Bogaram, R.R. District, A.P, India

Abstract


In the corporate world, various aspects of security have been changing in the course of time, addressed separately and notably by distinct and often non-communicating departments for IT security and fraud prevention. Today there is a greater recognition of the interconnected nature of security requirements, an approach variously known as holistic security, "all hazards" management, and other terms. Standard (ISO 28000) specifies the requirements for a security management system, including those aspects critical to security assurance for any organization or enterprise wishing to manage the security of the organization and its activities.
Automated Cam security deals with the real-time surveillance of restricted areas. ACS can reduce the human workload by the concept of image comparison. Initially a reference image would be saved in the database, and then cam will click images in regular interval of time, to compare these with the reference image. If any difference is found in between the compared images, then an alarm is raised to the directive personal regarding the security breach.
The environment in which ACS operates includes highly restricted places like sector 7, nuclear research and development centre, bank lockers with high security etc (where human entry is prohibited). ACS can be embedded onto a chip and can be independently used along with a cam. This integrated system can be used to notify us the alerts wirelessly. By using ACS i.e. security through cam would lead work to be minimized at the apex level.

Keywords


Live Image, Reference Image (Breach Free), Automatic Dispose, ACS-Automated Cam Security.



DOI: https://doi.org/10.36039/ciitaas%2F2%2F9%2F2010%2F107043.101-104