Intrusion detection system based on speckle pattern analysis

被引:0
|
作者
A. Dhall
J. K. Chhabra
N. S. Aulakh
机构
[1] Central Scientific Instruments Organisation,
来源
Experimental Techniques | 2005年 / 29卷
关键词
Speckle; Intrusion; Fiber optic; Security; Image processing;
D O I
暂无
中图分类号
学科分类号
摘要
Buried fiber intrusion detection by calculating the changes in the spatial distribution of energy in the output of a multimode optical fiber has been demonstrated. An analysis and experimental demonstrations of the system have been provided in which we observed that by using the very simple technique of speckle pattern analysis using image processing we could detect various intrusions. The system can be used to detect the passage of vehicles and personnel over buried sensing fibers. The non-electrical nature of the sensor would allow it to be undetectable by the intruder, and the low loss nature of fiber optics would allow the signal processing location to be located at a large distance from the actual sensor. The complete hardware utilized in this effort is one that can be realized at low cost. The same technique can be used in many other sensing applications like temperature sensing, pressure sensing, any kind of vibration sensing etc. Further improvements in the design can be planned using neural network and advanced image processing algorithms such that only human intrusions are separated from other (nuisance) intrusion signals.
引用
收藏
页码:25 / 31
页数:6
相关论文
共 50 条
  • [1] Intrusion detection system based on speckle pattern analysis
    Dhall, A
    Chhabra, JK
    Aulakh, NS
    [J]. EXPERIMENTAL TECHNIQUES, 2005, 29 (01) : 25 - 31
  • [2] Intrusion Detection System Based on Pattern Recognition
    Mohamed M. Abdeldayem
    [J]. Arabian Journal for Science and Engineering, 2023, 48 : 9849 - 9857
  • [3] Intrusion Detection System Based on Pattern Recognition
    Abdeldayem, Mohamed M.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) : 9849 - 9857
  • [4] The design and research of Intrusion Detection System based on pattern matching and statistical analysis
    Tian, JF
    Zhang, Z
    Zhao, WD
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 324 - 327
  • [5] A pattern matching based network intrusion detection system
    Zhou Chunyue
    Liu Yun
    Zhang Hongke
    [J]. 2006 9TH INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION, ROBOTICS AND VISION, VOLS 1- 5, 2006, : 1410 - +
  • [6] Research on Intrusion Detection System based on pattern recognition
    Zhu, Youchan
    Zheng, Ying
    [J]. NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 609 - 612
  • [7] ATTACK PATTERN ANALYSIS FRAMEWORK FOR MULTIAGENT INTRUSION DETECTION SYSTEM
    Kolaczek, Grzegorz
    Juszczyszyn, Krzysztof
    [J]. INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2008, 1 (03) : 215 - 224
  • [8] Attack pattern analysis framework for multiagent intrusion detection system
    Kołaczek G.
    Juszczyszyn K.
    [J]. International Journal of Computational Intelligence Systems, 2008, 1 (3) : 215 - 224
  • [9] Sequential pattern analysis for event-based intrusion detection
    Nisha, T.N.
    Pramod, Dhanya
    [J]. International Journal of Information and Computer Security, 2019, 11 (4-5): : 476 - 492
  • [10] Analysis of a Payload-based Network Intrusion Detection System using Pattern Recognition Processors
    Iqbal, Irshad M.
    Calix, Ricardo A.
    [J]. 2016 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2016, : 398 - 403