Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions

Similar documents
COMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES

OBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK

A SURVEY ON GESTURE RECOGNITION TECHNOLOGY

Face Recognition Based Attendance System with Student Monitoring Using RFID Technology

A Study on the control Method of 3-Dimensional Space Application using KINECT System Jong-wook Kang, Dong-jun Seo, and Dong-seok Jung,

Research Seminar. Stefano CARRINO fr.ch

R (2) Controlling System Application with hands by identifying movements through Camera

Real-Time Face Detection and Tracking for High Resolution Smart Camera System

Image Denoising Using Statistical and Non Statistical Method

Feature Extraction Techniques for Dorsal Hand Vein Pattern

A Proposal for Security Oversight at Automated Teller Machine System

Electronic disguised voice identification based on Mel- Frequency Cepstral Coefficient analysis

Hand & Upper Body Based Hybrid Gesture Recognition

A Real Time Static & Dynamic Hand Gesture Recognition System

Controlling Humanoid Robot Using Head Movements

Biometric Recognition: How Do I Know Who You Are?

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

SIMULATION-BASED MODEL CONTROL USING STATIC HAND GESTURES IN MATLAB

Live Hand Gesture Recognition using an Android Device

University of Toronto. Companion Robot Security. ECE1778 Winter Wei Hao Chang Apper Alexander Hong Programmer

Image Extraction using Image Mining Technique

International Journal of Advance Research in Computer Science and Management Studies

Wheeler-Classified Vehicle Detection System using CCTV Cameras

COMPARITIVE STUDY OF IMAGE DENOISING ALGORITHMS IN MEDICAL AND SATELLITE IMAGES

SMART SURVEILLANCE SYSTEM FOR FACE RECOGNITION

Image Processing and Particle Analysis for Road Traffic Detection

A SURVEY ON HAND GESTURE RECOGNITION

Gesticulation Based Smart Surface with Enhanced Biometric Security Using Raspberry Pi

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

ISSN Vol.02,Issue.17, November-2013, Pages:

Detection and Verification of Missing Components in SMD using AOI Techniques

Webpage: Volume 4, Issue VI, June 2016 ISSN

Design a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison

FACE RECOGNITION BY PIXEL INTENSITY

Motivation and objectives of the proposed study

Gesture Recognition with Real World Environment using Kinect: A Review

ELECTRICITY THEFT MONITORING AND ITS CONSUMPTION SAVINGS

Content Based Image Retrieval Using Color Histogram

System of Recognizing Human Action by Mining in Time-Series Motion Logs and Applications

Analysis of Various Methodology of Hand Gesture Recognition System using MATLAB

Introduction to DSP ECE-S352 Fall Quarter 2000 Matlab Project 1

Automated Mobility and Orientation System for Blind

Vishnu Nath. Usage of computer vision and humanoid robotics to create autonomous robots. (Ximea Currera RL04C Camera Kit)

Recognition Of Vehicle Number Plate Using MATLAB

Real Time Hand Gesture Tracking for Network Centric Application

An Enhanced Biometric System for Personal Authentication

How Many Pixels Do We Need to See Things?

Mandeep Singh Associate Professor, Chandigarh University,Gharuan, Punjab, India

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

THERMAL DETECTION OF WATER SATURATION SPOTS FOR LANDSLIDE PREDICTION

Face Detection System on Ada boost Algorithm Using Haar Classifiers

Advanced Techniques for Mobile Robotics Location-Based Activity Recognition

International Journal of Informative & Futuristic Research ISSN (Online):

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

A Rumination of Error Diffusions in Color Extended Visual Cryptography P.Pardhasaradhi #1, P.Seetharamaiah *2

Tampering Detection Algorithms: A Comparative Study

3D Face Recognition System in Time Critical Security Applications

Study of 3D Barcode with Steganography for Data Hiding

DESIGN A MODEL AND ALGORITHM FOR FOUR GESTURE IMAGES COMPARISON AND ANALYSIS USING HISTOGRAM GRAPH. Kota Bilaspur, Chhattisgarh, India

Automated Number Plate Verification System based on Video Analytics

Processing and Enhancement of Palm Vein Image in Vein Pattern Recognition System

SLIC based Hand Gesture Recognition with Artificial Neural Network

Wavelet-based Image Splicing Forgery Detection

A Wireless Smart Sensor Network for Flood Management Optimization

Image Forgery Detection Using Svm Classifier

GESTURE RECOGNITION SOLUTION FOR PRESENTATION CONTROL

Eye Tracking Computer Control-A Review

AR 2 kanoid: Augmented Reality ARkanoid

Hand Gesture Recognition System for Daily Information Retrieval Swapnil V.Ghorpade 1, Sagar A.Patil 2,Amol B.Gore 3, Govind A.

Finger rotation detection using a Color Pattern Mask

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

Non-Contact Vein Recognition Biometrics

STUDY OF VARIOUS TECHNIQUES FOR DRIVER BEHAVIOR MONITORING AND RECOGNITION SYSTEM

Intellectual Bank Safekeeping System

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

I. INTRODUCTION II. LITERATURE SURVEY. International Journal of Advanced Networking & Applications (IJANA) ISSN:

Obstacle Avoidance Robotic Vehicle Using Ultrasonic Sensor, Android And Bluetooth For Obstacle Detection

Fabrication of the kinect remote-controlled cars and planning of the motion interaction courses

Autonomous Face Recognition

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Research on Hand Gesture Recognition Using Convolutional Neural Network

Comparision of different Image Resolution Enhancement techniques using wavelet transform

SMARTPHONE SENSOR BASED GESTURE RECOGNITION LIBRARY

Development of Image Processing Technique for Preventing Unauthorized Photography

A Novel Technique for Automatic Modulation Classification and Time-Frequency Analysis of Digitally Modulated Signals

A Novel Approach of Compressing Images and Assessment on Quality with Scaling Factor

DISEASE DETECTION OF TOMATO PLANT LEAF USING ANDROID APPLICATION

Face Detection: A Literature Review

DYNAMIC POWER ALLOCATION SCHEME USING LOAD MATRIX TO CONTROL INTERFERENCE IN 4G MOBILE COMMUNICATION SYSTEMS

Data Hiding Technique Using Pixel Masking & Message Digest Algorithm (DHTMMD)

Automatic optical measurement of high density fiber connector

HUMAN-COMPUTER INTERACTION: OVERVIEW ON STATE OF THE ART TECHNOLOGY

Human Computer Interaction by Gesture Recognition

ISSN: (Online) Volume 2, Issue 1, January 2014 International Journal of Advance Research in Computer Science and Management Studies

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

Region Based Satellite Image Segmentation Using JSEG Algorithm

Online Signature Verification by Using FPGA

Service Robots in an Intelligent House

UUIs Ubiquitous User Interfaces

Iris Recognition using Hamming Distance and Fragile Bit Distance

Transcription:

Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions S Mahaboob Hussain 1, Prathyusha Kanakam 2, A. S. N. Chakravarthy 3 1 Assistant Professor, Computer Science & Engineering, Vishnu Institute of Technology, AP, India 2Assistant Professor, Computer Science & Engineering, Vishnu Institute of Technology, AP, India 3Associate Professor, Computer Science & Engineering, JNTUK-UVEV, AP, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - ATM Robbery and in addition to ruthless Body Language things on women is happening more often than not amid the ATM transactions due to the absence of security in ATMs. In order to avoid such things, gesture recognition provides a way to ensure by utilizing sensors along with stereo cameras that detects the body movements of gatecrashers and blow caution to warn Posture Head Motion Face Expression Eye Contact Gestures security. 3D model-based and appearance based algorithms are used to detect the body language of the intruders who have entered the ATMs. In this paper, Pioneering Maneuver (PM) Algorithm is presented to detect such brutal activities using F-Measure that is for the most part event. Key Words: Biometrics, Stereo cameras, Gesture recognition, ATM transactions security 1. INTRODUCTION Gesture Recognition Technology (GRT) [1] [2] is one among a variety of biometric technologies with a goal of interpreting human nature by mathematical algorithms. Gestures and distinct postures are able to originate from body motion or state but, commonly originate from face or hand. Fig. 1 illustrates the image capturing unit of regular Gesture Recognition Technology and gestures of individuals either static or dynamic can be plotted in order to compare with that of in the database. The promising application of this technology is emotion identification with all the expressions and hand gesture detection while anyone got attacked during ATM transactions. To interpret sign language [3], different methods have been geared up using cameras and computer vision algorithms. This gesture recognition can perceive a way for computers to identify with human body languages. Here, a range of features of body language are considered while dealing with gesture recognition. The classification and identification of way of walking attitude proxemics and individual behaviors be the sub-part of gesture recognition which builds a bridge between users and machines to identify the fierce thing and evade them up to some extent by cautioning. Various postures like pushing, striking, kicking and also motion picture regarding robbery in ATM are stacked in the database. Some of them are proffered in Fig. 2. Fig-1: Image Capturing Unit of GRT Fig -2: Various Postures of human to recognize in ATM 2015, IRJET ISO 9001:2008 Certified Journal Page 2293

Fig -3: Features captured by camera In gesture recognition technology, a camera reads the movement of the human body and imparts the information to a computer that uses the gesture as input to control devices or applications (especially while using stereo cameras). Case in point, an individual applauding together before a cam can create the sound of images was slammed by and large when the motion is sustained completely through a computer. The inbuilt cameras of sensors capture all facial and speech expressions (lip reading) and eye moments along with handand body movement which are offered in Fig. 3. The graphical user interface (GUI) will focus on all the characteristics of body language, unlike other interfaces which concentrates principally on this alone. 2. PIONEERING MANEUVER (PM) USING GESTURE RECOGNITION TECHNOLOGY An assortment of applications of gesture recognition such as switching channels without a remote in a television or a music system, tuning out the lights by usual movements of people in house and now automobiles need sensor assistance for parking and blind-spot recognition. Gesture recognition also involves leap motion where one's gestures act as an input device to control their ones personal computer. Of all the applications, this paper expounds a state-of-theart technique which is an imminent application of gesture recognition technology in order to serve security over and above to eradicate fraudulent activities ensure more recurrently during ATM transactions. It is an enhancement for regular GRT and introduces an advent to capture the motion videos and transmitting through various modules to perform specific actions for indulging assurance at ATMs. Fig -4: Architecture of PM As in the Fig. 4 the System design is in such a way that everything will be performed in terms of modules. Stereo cameras [5] are fixed in sensors to capture motion pictures as well as to find the appearance of the person who entered ATM. The output of the camera is approximated 3D representation by formulating in x, y and z dimensions with two lenses having a focal plane for each of them which are separated by a small baseline. Along with these cameras, the position reference such as lexican stripe or infrared emitters will give the direct motion measurement (6D vision) gestures. Pre-processing module equipped with moving average filters to dispose of the high-frequency noise from 3- dimensional signals. After amputating the noise, lineaments are derived in feature extraction module and class label filter which is a useful post-processing module that relinquish enormous or sporadic prediction spikes that may be made by a classifier on continuous input stream of data ( Fig. 4 ). The comparison is made with the extracted features and dynamic temporal gestures such as swiping or tapping which are stored in the database. If the match is not found then the alert message will be sent to ring alarm outside ATM and also to the control room to alert the force [6]. 2. PM APPROACH DESIGN Pioneering Maneuver (PM) is an innovative progress technique which combines the features of both appearances based and 3D-model based algorithms. The step by step procedure conferred in this paper. Firstly, Users are identified by their head motion, facial expressions including lip reading, static gestures in which a user has their hands in a specific posture and dynamic gestures like swiping or tapping can be captured using stereo cameras ( Fig. 5 ). 2015, IRJET ISO 9001:2008 Certified Journal Page 2294

Fig -5: Internal process of the camera In addition to that, appearance of individuals is also identified as some of the images regarding their outward show are loaded in database. This above technique will follow the underneath algorithm Algorithm: PM Begin Step 1: Capture Motion Picture of individual entered in ATM <Appearance> && <motion video> Step 2: Pre-process the motion video using moving average filter for 3D Motion video Step 3: Post-Process the motion video by extracting features using class label Filter Step 4: Generate score for the video using F-measure. Step 5: Compare the motion video to recognize the dynamic temporal gestures during the time of enrolment using the F- score obtained for the video. If F-score > threshold Then send alert message to ring the alarm outside ATM as well as to Control room Else no action will be taken. End Motion picture/ video will be pre-processed to remove high-frequency noise which moreover trapped during capture by means of moving average filter. The post processing techniques like feature extraction, as well as the classification, is done through a class label filter which acts as a classifier on an unceasing stream of input data. The correlation between motion video with that of dynamic temporal gestures are made using a statistical measure called F-measure. Hence by applying the algorithm to detect the moving object, the model needs to estimate the surroundings subtraction [7]. Evaluation will be done by estimating each and every frame by subtracting the second frame from the first. The background will be accurately detected and then, the moving object gestures of the body will be effortlessly detected. In this proposed model, the background will be motionless; hence it is to classify the pixels of the moving gesture of the human body. F-score [8] gives the statistical analysis of binary classification and depends mostly on precision 1 and recall 2 [9] and it is measured by calculating the weighted average of precision and recall (harmonic mean of precision and recall). 2015, IRJET ISO 9001:2008 Certified Journal Page 2295 (1) The value of the threshold is for the posture which is stored in the database and F-Score value for every motion video that is captured is calculated and both the values are collated with each other. If the score limit crosses the threshold then the alert message will be sent to alarm outside ATM and to control room. After receiving the alert message, the alarm will blow as caution/ warning. 3. STATISTICS AND ANALYSIS ATM robbery is most often nowadays and there is no fortification for the people who are processing their transactions. Chart. 1 shows the statistical report of various robberies in UK since 2005. To make certain security ordinary CC cameras in ATM centre are replaced with stereo cameras which will provide the approximated 3D illustration of the human and their gestures. In various places of the world these violent attacks are increasing day-by-day, according to the statistics of the world database shows the numerous increase. The main intention of this paper is to look forward about the attacks and to avoid the fatal counts by a technical approach using this model. As per the database from the ATM security and fraud prevention [4], one can easily understand the rising of robberies along with the attacks on the human beings. The analysis about these ATM robberies using various explodes and with some gas assault to threaten the users are shown in Chart. 1. Since from 2005 the attacks have been increased, finally till year 2013 the rate has increased more than three times from year 2005. General ATM transaction comprises a provider which has internal protection. I.e., encrypting and decrypting the data at the data centre and providing money but this is not at all a sufficient amount to protect people from intruder who enters ATM centre suddenly and attacks the people who are processing their transactions. 1 Precision Score gives the fraction of number of true positives and number of positives. 2 Recall Score gives the fraction of number of true positives and number of positives that should have been returned.

Chart -1: ATM robberies using Explosives and Gas attacks (By number of incidents) significant increase from 2009 to 2013-courtesy from ATM Security & Fraud Prevention 4. CONCLUSION ATM robberies are increasing day by day and some of the brutal things happened to the humans mostly to the women takes place in ATM. Gesture recognition will show a path to avoid such activities which are its imminent application. In this paper, image/video capturing is conferred and a novel technique and its architecture was introduced which is an enhancement in security systems of ATMs to eradicate fraudulent activities. F-score is presented to measure the accuracy which depends on the precision and recall score in order to make the comparison between captured video and dynamic gestures stored in the database. Thus, it is ease to avoid the serious issues in the ATM by the intruders. REFERENCES [1] Mitra, S.; Acharya, T., "Gesture Recognition: A Survey," Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, vol.37, no.3, pp.311,324, May 2007. [2] Harsha Vachher, A white paper on Gesture Recognition, Engineering and R&D services, HCL, April 2014. [3] Starner, Thad E. Visual Recognition of American Sign Language Using Hidden Markov Models. Massachusetts Inst of Tech Cambridge, Dept of Brain And Cognitive Sciences, 1995 [4] Mahaboob S Hussain, A S N Chakravarthy and G S Sarma. Article: BSC: A Novel Scheme for Providing Security using Biometric Smart Card. International Journal of Computer Applications 80(1):43-51, October 2013. [5] Goshtasby, Ardeshir, and William A. Gruver. "Design of a single-lens stereo camera system." Pattern Recognition 26.6 (1993): 923-937. [6] B V Prasanthi, Mahaboob S Hussain, Prathyusha Kanakam and A S N Chakravarthy. Article: Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions. International Journal of Computer Applications 112(9):1-5, February 2015. [7] R. Cucchiara, C. Grana, M. Piccardi, A. Prati, and S. Sirotti, Improving shadow suppression in moving object detection with HSV color information, in Proceedings of IEEE Int l Conference on Intelligent Transportation Systems, Aug. 2001, pp. 334 339. [8] Powers, David Martin. "Evaluation: from precision, recall and F-measure to ROC, informedness, markedness and correlation." (2011). [9] Hussain, S.M.; Kanakam, P.; Narayana, D.S.; Gupta, S., "Palazzo Matrix Model: An approach to simulate the efficient semantic results in search engines," in Electrical, Computer and Communication Technologies (ICECCT), 2015 IEEE International Conference on, vol., no., pp.1-6, 5-7 March 2015. [10] Kanakam, P.; Hussain, S.M.; Chakravarthy, A.S.N., Electronic Noses: Forestalling Fire Disasters-A technique to prevent false fire alarms and fatal casualties, Computational Intelligence and Computing Research (ICCIC), 2015 IEEE International Conference on, (In Press). 2015, IRJET ISO 9001:2008 Certified Journal Page 2296

BIOGRAPHIES S. Mahaboob Hussain received his Master s Degree in Computer Science and Engineering from JNTUK- University College of Engineering Vizianagaram. Currently he is working as Assistant Professor in CSE, Vishnu Institute of Technology. His research interests are Computer Forensics, Semantic Web and Cognitive Science. He has authored more than ten publications in various journals and International conferences. He won two best paper awards so far for from (1) ICSCD 2015, (2) 2015 IEEE ICCIC. Prathyusha Kanakam received her M.Tech in Computer Science Engineering from JNTUK- University College of Engineering Vizianagaram. Currently she is working as Assistant Professor in CSE Vishnu Institute of Technology. Her research interests are Biometrics securities and Semantic Web. She has authored more than ten publications in various journals and International conferences. She won two best paper awards so far from (1) ICSCD 2015, (2) 2015 IEEE ICCIC. Dr. A. S. N Chakravarthy received his Doctoral degree from Acharya Nagarjuna University. Currently he is working as Associate Professor in CSE, JNTUK- University College of Engineering Vizianagaram University and coordinator for MOOCs in JNTUK Kakinada. He has several publications in National, International Journals and conferences. He received various awards in his career like Best Professor and Best Faculty in Computer Science by Association of Scientists, Developers and Faculties [ASDF]. His research interests are Forensics science, Network securities and Biometrics. 2015, IRJET ISO 9001:2008 Certified Journal Page 2297