SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 336
An AI Based ATM Intelligent Security
System using Open CV and YOLO
Prem Krishna, Saheel Ahamed, Roshan Kartik
Computer Science, K Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India
ABSTRACT
Nowadays most of the surveillance cameras in ATM doesn’trecordwithdetail
for analysis of incidents. Due to this most of the ATM cases gets unsolved. In
this paper a system to improve ATM security is proposed. The proposed
system deals with the development of a application using Open CV, YOLO and
AI for automation of video surveillance in ATM machines and detect any type
of potential criminal activities that might be arising.
KEYWORDS: ATM, Open computer vision (open CV), You only live once (YOLO),
Artificial Intelligence (AI)
How to cite this paper: Prem Krishna |
Saheel Ahamed | Roshan Kartik "An AI
Based ATM Intelligent Security System
using Open CV and
YOLO" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-4, June 2021, pp.336-338, URL:
www.ijtsrd.com/papers/ijtsrd41232.pdf
Copyright © 2021 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
INTRODUCTION
It is a well-known fact that digital India is the outcome of
many innovation and technological advancements.
Nowadays Surveillance cameras in ATM centers are only for
recording purpose. If any theft activities are occurred, it will
be known only by human information. Then police will start
investigating by the help ofCCTVrecords.Insomesituations,
thieves will cover or destroy the camera so it can’t record.
The world is known to extensive usage of automated video
surveillance systems which plays a vital role in our day to
day lives in order to enhance protection and security for
individuals and infrastructure.
Tracking and detection of objects is an essential component
in various traffic monitoring systems, biometrics and
security infrastructures, safety monitoring, various web
applications and recognition of objects for mobile devices
etc. One major application area of this process is the
detection of robbery. In this system theprimaryfocuswill be
in the field of detection of suspicious activities or crimein an
ATM (Automatic Teller Machine) which is basically a
profitable bank service which enables financial transactions
in public spaces where the machines are a replication of the
bank clerks and tellers. Although several researches are
going on in the field of ATM crime detection, however the
utilization of the crime detectionsystemisscarcelyobserved
due to lack of efficiency and processing in the existing crime
detection systems. Many researchers found a computer
vision application called Open CV and usedtoimplementray
tracking in games. Open CV was also used in 3D designs and
for visually impaired people o detect objects in frontofthem
[1]. Hence the idea of creating such an automated system
was conceived after relative observations of the real-life
incidents that are happening in and around the globe. The
proliferation of the ATM frauds which involvesactivitieslike
Camera Covering, Money grabbing inside ATM Center,
Stealing the ATM Machine, Risky Voice isa matterofconcern
which would be tackled by the proposed system to enable
secure financial transaction at any time.
RELATED WORK
In this existing system Surveillancecamera isfixedinsidethe
ATM room. It will record video every day. If any problem
arises ATM related officers will see the footage and analyze
the problem. No one can implement how manymembersare
inside the ATM if there is any damage done to camera by
thieves.
Project deals with the security of ATM machine. Whenever
robbery occurs, Vibration sensor and MEMS sensor is used
here which senses vibration produced from ATM machine
and the movement of ATM machine [2]. GSM is used to send
the message to the police station and authority. In this
project we use PIC controller which is based on embedded
system process real time data collected using the MEMS
sensor and vibration sensor. When the movement of
machine and the vibration is sensed the beep sound will
occur from the buzzer [3]. For closing the door of ATM DC
Motor is used. Smoke detector is used here to sense the
gaseous or smoke near ATM machine.
IJTSRD41232
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 337
PROPOSED SYSTEM
In this proposed system We will monitor the whole ATM
room [4]. If persons count more than one, inside of the ATM
room, buzzer sound will bering.WatchmanandATMofficers
Images trained to our processor. So, watchman can help the
person inside of the ATM room, in this casethebuzzersound
will not ring. If any person stands more than 10 minutes
inside of the ATM room, person photos will be stored to
crime folder and sent to the official. Photos are also sending
via mail alert. In this proposed system we will find persons
in real time using AI, OPENCV, YOLO (You only live once).
After acquisition of image it has to be pre-processed and
compressed. Images are used to train the model. It istrained
by performing feature extraction on the image to obtain the
required pattern in the image. Followed by feature fusion
and dimension reduction to compress the image for reliable
and real time performance [5]. Then this YOLO dataset is
used to train the classifier. Comparing the performance of
various classifiers, we select the optimum one, and thus the
person recognition model is achieved. Now any test image
may be given to this model which will be classified into one
of the classes the model has been trained into.
Working of Open CV and YOLO
Open CV
Open Source Computer Vision Library’ initiated by some
enthusiast coders in ‘1999’ to incorporate Image Processing
into a wide variety of coding languages. It has C++, C, and
Python interfaces running on Windows, Linux, Android and
Mac.
Officially launched in 1999 the Open CV project was initially
an Intel Research initiative to advance CPU-intensive
applications, part of a series of projects including real-time
ray tracing and 3D display walls. The main contributors to
the project included a number of optimization experts in
Intel Russia, as well as Intel's Performance Library Team.
Disseminate vision knowledge by providing a common
infrastructure that developers could build on, so that code
would be more readily readable and transferable. Advance
vision-based commercial applications by making portable,
performance-optimized code available for free – with a
license that did not require code to be open or freeitself.The
first alpha version of Open CV was released to the public at
the IEEE Conference on Computer Vision and Pattern
Recognition in 2000, and five betas were released between
2001 and 2005. The first 1.0 version was released in 2006.A
version 1.1 "pre-release" was released in October 2008. The
second major release of the Open CV was in October 2009.
Open CV 2 includes major changes to the C++ interface,
aiming at easier, more type-safepatterns, newfunctions,and
better implementations for existing ones in terms of
performance (especially on multi-core systems). Official
releases now occur every six months and development is
now done by an independent Russian team supported by
commercial corporations. In August 2012, support for Open
CV was taken over by a non-profit foundation OpenCV.org,
which maintains a developer and user site. On May 2016,
Intel signed an agreement to acquire Intesa leading
developer of Open CV. In July 2020, Open CV announced and
began a Kick starter campaign for the Open CV AI Kit, a
series of hardware modules and additions to Open CV
supporting Spatial AI.
YOLO
You Only Look Once (YOLO) is a network that uses Deep
Learning (DL) algorithms for object detection. YOLO
performs object detection by classifying certain objects
within the image and determining where theyarelocated on
it. For example, if you input an image of a herd of sheep into
a YOLO network, it will generate an output of a vector of
bounding boxes for each individual sheep and classify it as
such.
Once you insert input an image into a YOLO algorithm, it
splits the images into an SxS grid that it uses to predict
whether the specific bounding box contains the object (or
parts of it) and then uses this information to predict a class
for the object.
Before we can go into details and explain how the
algorithm functions, we need to understand how the
algorithm builds and specifies each bounding box. The
YOLO algorithm uses four components and additional value
to predict an output.
1. The center of a bounding box (bx by)
2. Width (bw)
3. Height (bh)
4. The Class of the object (c)
The final predicted value is confidence (pc). It represents
the probability of the existence of an object within the
bounding box. The (x,y) coordinates represent the center of
the bounding box. Typically, most of the bounding boxes
will not contain an object, so we need to use the
pc prediction. We can use a process called non-max
suppression to remove unnecessary boxes with low
probability to contain objects and those who share big
areas with other boxes.
LOCAL BINARY PATTERN
It is a simple yet very efficient texture operator which labels
the pixels of an image by thresholding the neighborhood of
each pixel and considers the result as a binary number.
Face detection, storing and retriving
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 338
CONCLUSION
This paper discuses about an AI based ATM security system
by utilizing Open CV and YOLO. Thissystemuseslocal binary
pattern algorithm to detect the faces and detect the crime.
This system also has several features as if the person stands
more than ten minutes the buzzer will ring and the photo
will be sent to the administrator. This system is proposed to
reduce the difficulty of officers to find the person. For the
future we will develop the concept and add new features
which would help the community even more.
References
[1] Durette, B., Louveton, N., Alleysson, D., and H´erault,J,
2008. Visuoauditory sensory substitutionfor mobility
assistance: testing The VIBE.In Workshop on
Computer Vision Applications for the Visually
Impaired, Marseille, France
[2] Hern´andez, A. F. R. et al, 2009. Computer Solutions
on Sensory Substitution for Sensory Disabled People.
In Proceedings of the 8th WSEAS International
Conference on Computational Intelligence,
Manmachine Systems and Cybernetics
[3] Tang, H., and Beebe, D. J., 2006. An oral tactile
interface for blindnavigation. IEEE Trans Neural Syst
Rehabil Eng, pp. 116–123.
[4] Auvray, M., Hanneton, S., and O’Regan, J. K., 2007.
Learning to perceive with a visuo - auditory
substitution system: Localisation and object
recognition with ’The vOICe
[5] Kannamma, M., Chanthini, B., Manivannan, D.:
Controlling and monitoring process in industrial
automation using Zigbee.In:57th IEEE International
Conference on Advances in computing,
Communications and Informatics (ICACCI), pp.5901-
5902.IEEE(2013)
[6] Kim., Jaewoo., Jaiyong Lee., Yun, J.: M2M service
platforms: survey issues, and enabling technologies.
IEEE Communications Society(2013)
[7] Kannan, P., MeenakshiVidya, P.: Design and
Implementaion of Security Based ATM theft
Monitoring system.01-07(2013)

Contenu connexe

Tendances

AICamp - Dr Ramine Tinati - Making Computer Vision Real
AICamp - Dr Ramine Tinati - Making Computer Vision RealAICamp - Dr Ramine Tinati - Making Computer Vision Real
AICamp - Dr Ramine Tinati - Making Computer Vision RealRamine Tinati
 
Java Memory Model - memory in the eyes of a multithreading application
Java Memory Model - memory in the eyes of a multithreading applicationJava Memory Model - memory in the eyes of a multithreading application
Java Memory Model - memory in the eyes of a multithreading applicationPhilip Yankov
 
Highly-scalable Reinforcement Learning RLlib for Real-world Applications
Highly-scalable Reinforcement Learning RLlib for Real-world ApplicationsHighly-scalable Reinforcement Learning RLlib for Real-world Applications
Highly-scalable Reinforcement Learning RLlib for Real-world ApplicationsBill Liu
 
20090918 Agile Computer Control of a Complex Experiment
20090918 Agile Computer Control of a Complex Experiment20090918 Agile Computer Control of a Complex Experiment
20090918 Agile Computer Control of a Complex ExperimentJonathan Blakes
 
Metaflow: The ML Infrastructure at Netflix
Metaflow: The ML Infrastructure at NetflixMetaflow: The ML Infrastructure at Netflix
Metaflow: The ML Infrastructure at NetflixBill Liu
 
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...Edge AI and Vision Alliance
 
Dog Breed Classification using PyTorch on Azure Machine Learning
Dog Breed Classification using PyTorch on Azure Machine LearningDog Breed Classification using PyTorch on Azure Machine Learning
Dog Breed Classification using PyTorch on Azure Machine LearningHeather Spetalnick
 
Time Series Anomaly Detection with .net and Azure
Time Series Anomaly Detection with .net and AzureTime Series Anomaly Detection with .net and Azure
Time Series Anomaly Detection with .net and AzureMarco Parenzan
 
Squeezing Deep Learning Into Mobile Phones
Squeezing Deep Learning Into Mobile PhonesSqueezing Deep Learning Into Mobile Phones
Squeezing Deep Learning Into Mobile PhonesAnirudh Koul
 
The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 Eran Shlomo
 
Think Big | Enterprise Artificial Intelligence
Think Big | Enterprise Artificial IntelligenceThink Big | Enterprise Artificial Intelligence
Think Big | Enterprise Artificial IntelligenceData Science Milan
 
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU Selection
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU SelectionMachine-Learning-based Performance Heuristics for Runtime CPU/GPU Selection
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU SelectionAkihiro Hayashi
 
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...Akihiro Hayashi
 
An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...
 An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co... An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...
An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...Toshihiko Yamakami
 

Tendances (14)

AICamp - Dr Ramine Tinati - Making Computer Vision Real
AICamp - Dr Ramine Tinati - Making Computer Vision RealAICamp - Dr Ramine Tinati - Making Computer Vision Real
AICamp - Dr Ramine Tinati - Making Computer Vision Real
 
Java Memory Model - memory in the eyes of a multithreading application
Java Memory Model - memory in the eyes of a multithreading applicationJava Memory Model - memory in the eyes of a multithreading application
Java Memory Model - memory in the eyes of a multithreading application
 
Highly-scalable Reinforcement Learning RLlib for Real-world Applications
Highly-scalable Reinforcement Learning RLlib for Real-world ApplicationsHighly-scalable Reinforcement Learning RLlib for Real-world Applications
Highly-scalable Reinforcement Learning RLlib for Real-world Applications
 
20090918 Agile Computer Control of a Complex Experiment
20090918 Agile Computer Control of a Complex Experiment20090918 Agile Computer Control of a Complex Experiment
20090918 Agile Computer Control of a Complex Experiment
 
Metaflow: The ML Infrastructure at Netflix
Metaflow: The ML Infrastructure at NetflixMetaflow: The ML Infrastructure at Netflix
Metaflow: The ML Infrastructure at Netflix
 
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...
“Introduction to the TVM Open Source Deep Learning Compiler Stack,” a Present...
 
Dog Breed Classification using PyTorch on Azure Machine Learning
Dog Breed Classification using PyTorch on Azure Machine LearningDog Breed Classification using PyTorch on Azure Machine Learning
Dog Breed Classification using PyTorch on Azure Machine Learning
 
Time Series Anomaly Detection with .net and Azure
Time Series Anomaly Detection with .net and AzureTime Series Anomaly Detection with .net and Azure
Time Series Anomaly Detection with .net and Azure
 
Squeezing Deep Learning Into Mobile Phones
Squeezing Deep Learning Into Mobile PhonesSqueezing Deep Learning Into Mobile Phones
Squeezing Deep Learning Into Mobile Phones
 
The deep learning tour - Q1 2017
The deep learning tour - Q1 2017 The deep learning tour - Q1 2017
The deep learning tour - Q1 2017
 
Think Big | Enterprise Artificial Intelligence
Think Big | Enterprise Artificial IntelligenceThink Big | Enterprise Artificial Intelligence
Think Big | Enterprise Artificial Intelligence
 
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU Selection
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU SelectionMachine-Learning-based Performance Heuristics for Runtime CPU/GPU Selection
Machine-Learning-based Performance Heuristics for Runtime CPU/GPU Selection
 
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...
Machine-learning based performance heuristics for Runtime CPU/GPU Selection i...
 
An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...
 An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co... An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...
An Experimental Implementation of an Edge-based AI Engine with Edge-Cloud Co...
 

Similaire à An AI Based ATM Intelligent Security System using Open CV and YOLO

Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionIRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET Journal
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
 
A Smart Assistance for Visually Impaired
A Smart Assistance for Visually ImpairedA Smart Assistance for Visually Impaired
A Smart Assistance for Visually ImpairedIRJET Journal
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET Journal
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET Journal
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTIRJET Journal
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Laura Arrigo
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptxDAshok2
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringIRJET Journal
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfSabhanayagham Thirugnanasambandam
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...nooriasukmaningtyas
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in roboticsIAEME Publication
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 

Similaire à An AI Based ATM Intelligent Security System using Open CV and YOLO (20)

Smart Surveillance System through Computer Vision
Smart Surveillance System through Computer VisionSmart Surveillance System through Computer Vision
Smart Surveillance System through Computer Vision
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCECRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCE
 
A Smart Assistance for Visually Impaired
A Smart Assistance for Visually ImpairedA Smart Assistance for Visually Impaired
A Smart Assistance for Visually Impaired
 
IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...IRJET- Automated Criminal Identification System using Face Detection and Reco...
IRJET- Automated Criminal Identification System using Face Detection and Reco...
 
IRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoTIRJET - Face Recognition Door Lock using IoT
IRJET - Face Recognition Door Lock using IoT
 
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOTASSISTANCE SYSTEM FOR DRIVERS USING IOT
ASSISTANCE SYSTEM FOR DRIVERS USING IOT
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12Nt2580 Unit 7 Chapter 12
Nt2580 Unit 7 Chapter 12
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
doorsystem (2).pptx
doorsystem (2).pptxdoorsystem (2).pptx
doorsystem (2).pptx
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
Covid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health MonitoringCovid Norms Checker with IOT Based Health Monitoring
Covid Norms Checker with IOT Based Health Monitoring
 
Opencv Projects
Opencv ProjectsOpencv Projects
Opencv Projects
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Real time face recognition of video surveillance system using haar cascade c...
Real time face recognition of video surveillance system using  haar cascade c...Real time face recognition of video surveillance system using  haar cascade c...
Real time face recognition of video surveillance system using haar cascade c...
 
Visual pattern recognition in robotics
Visual pattern recognition in roboticsVisual pattern recognition in robotics
Visual pattern recognition in robotics
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Opencv
OpencvOpencv
Opencv
 

Plus de YogeshIJTSRD

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An OverviewYogeshIJTSRD
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraYogeshIJTSRD
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisYogeshIJTSRD
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...YogeshIJTSRD
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesYogeshIJTSRD
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderYogeshIJTSRD
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...YogeshIJTSRD
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriYogeshIJTSRD
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineYogeshIJTSRD
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreYogeshIJTSRD
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceYogeshIJTSRD
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeYogeshIJTSRD
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...YogeshIJTSRD
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...YogeshIJTSRD
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewYogeshIJTSRD
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...YogeshIJTSRD
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentYogeshIJTSRD
 

Plus de YogeshIJTSRD (20)

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
 

Dernier

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Dernier (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

An AI Based ATM Intelligent Security System using Open CV and YOLO

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 336 An AI Based ATM Intelligent Security System using Open CV and YOLO Prem Krishna, Saheel Ahamed, Roshan Kartik Computer Science, K Ramakrishnan College of Engineering, Trichy, Tamil Nadu, India ABSTRACT Nowadays most of the surveillance cameras in ATM doesn’trecordwithdetail for analysis of incidents. Due to this most of the ATM cases gets unsolved. In this paper a system to improve ATM security is proposed. The proposed system deals with the development of a application using Open CV, YOLO and AI for automation of video surveillance in ATM machines and detect any type of potential criminal activities that might be arising. KEYWORDS: ATM, Open computer vision (open CV), You only live once (YOLO), Artificial Intelligence (AI) How to cite this paper: Prem Krishna | Saheel Ahamed | Roshan Kartik "An AI Based ATM Intelligent Security System using Open CV and YOLO" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-4, June 2021, pp.336-338, URL: www.ijtsrd.com/papers/ijtsrd41232.pdf Copyright © 2021 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) INTRODUCTION It is a well-known fact that digital India is the outcome of many innovation and technological advancements. Nowadays Surveillance cameras in ATM centers are only for recording purpose. If any theft activities are occurred, it will be known only by human information. Then police will start investigating by the help ofCCTVrecords.Insomesituations, thieves will cover or destroy the camera so it can’t record. The world is known to extensive usage of automated video surveillance systems which plays a vital role in our day to day lives in order to enhance protection and security for individuals and infrastructure. Tracking and detection of objects is an essential component in various traffic monitoring systems, biometrics and security infrastructures, safety monitoring, various web applications and recognition of objects for mobile devices etc. One major application area of this process is the detection of robbery. In this system theprimaryfocuswill be in the field of detection of suspicious activities or crimein an ATM (Automatic Teller Machine) which is basically a profitable bank service which enables financial transactions in public spaces where the machines are a replication of the bank clerks and tellers. Although several researches are going on in the field of ATM crime detection, however the utilization of the crime detectionsystemisscarcelyobserved due to lack of efficiency and processing in the existing crime detection systems. Many researchers found a computer vision application called Open CV and usedtoimplementray tracking in games. Open CV was also used in 3D designs and for visually impaired people o detect objects in frontofthem [1]. Hence the idea of creating such an automated system was conceived after relative observations of the real-life incidents that are happening in and around the globe. The proliferation of the ATM frauds which involvesactivitieslike Camera Covering, Money grabbing inside ATM Center, Stealing the ATM Machine, Risky Voice isa matterofconcern which would be tackled by the proposed system to enable secure financial transaction at any time. RELATED WORK In this existing system Surveillancecamera isfixedinsidethe ATM room. It will record video every day. If any problem arises ATM related officers will see the footage and analyze the problem. No one can implement how manymembersare inside the ATM if there is any damage done to camera by thieves. Project deals with the security of ATM machine. Whenever robbery occurs, Vibration sensor and MEMS sensor is used here which senses vibration produced from ATM machine and the movement of ATM machine [2]. GSM is used to send the message to the police station and authority. In this project we use PIC controller which is based on embedded system process real time data collected using the MEMS sensor and vibration sensor. When the movement of machine and the vibration is sensed the beep sound will occur from the buzzer [3]. For closing the door of ATM DC Motor is used. Smoke detector is used here to sense the gaseous or smoke near ATM machine. IJTSRD41232
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 337 PROPOSED SYSTEM In this proposed system We will monitor the whole ATM room [4]. If persons count more than one, inside of the ATM room, buzzer sound will bering.WatchmanandATMofficers Images trained to our processor. So, watchman can help the person inside of the ATM room, in this casethebuzzersound will not ring. If any person stands more than 10 minutes inside of the ATM room, person photos will be stored to crime folder and sent to the official. Photos are also sending via mail alert. In this proposed system we will find persons in real time using AI, OPENCV, YOLO (You only live once). After acquisition of image it has to be pre-processed and compressed. Images are used to train the model. It istrained by performing feature extraction on the image to obtain the required pattern in the image. Followed by feature fusion and dimension reduction to compress the image for reliable and real time performance [5]. Then this YOLO dataset is used to train the classifier. Comparing the performance of various classifiers, we select the optimum one, and thus the person recognition model is achieved. Now any test image may be given to this model which will be classified into one of the classes the model has been trained into. Working of Open CV and YOLO Open CV Open Source Computer Vision Library’ initiated by some enthusiast coders in ‘1999’ to incorporate Image Processing into a wide variety of coding languages. It has C++, C, and Python interfaces running on Windows, Linux, Android and Mac. Officially launched in 1999 the Open CV project was initially an Intel Research initiative to advance CPU-intensive applications, part of a series of projects including real-time ray tracing and 3D display walls. The main contributors to the project included a number of optimization experts in Intel Russia, as well as Intel's Performance Library Team. Disseminate vision knowledge by providing a common infrastructure that developers could build on, so that code would be more readily readable and transferable. Advance vision-based commercial applications by making portable, performance-optimized code available for free – with a license that did not require code to be open or freeitself.The first alpha version of Open CV was released to the public at the IEEE Conference on Computer Vision and Pattern Recognition in 2000, and five betas were released between 2001 and 2005. The first 1.0 version was released in 2006.A version 1.1 "pre-release" was released in October 2008. The second major release of the Open CV was in October 2009. Open CV 2 includes major changes to the C++ interface, aiming at easier, more type-safepatterns, newfunctions,and better implementations for existing ones in terms of performance (especially on multi-core systems). Official releases now occur every six months and development is now done by an independent Russian team supported by commercial corporations. In August 2012, support for Open CV was taken over by a non-profit foundation OpenCV.org, which maintains a developer and user site. On May 2016, Intel signed an agreement to acquire Intesa leading developer of Open CV. In July 2020, Open CV announced and began a Kick starter campaign for the Open CV AI Kit, a series of hardware modules and additions to Open CV supporting Spatial AI. YOLO You Only Look Once (YOLO) is a network that uses Deep Learning (DL) algorithms for object detection. YOLO performs object detection by classifying certain objects within the image and determining where theyarelocated on it. For example, if you input an image of a herd of sheep into a YOLO network, it will generate an output of a vector of bounding boxes for each individual sheep and classify it as such. Once you insert input an image into a YOLO algorithm, it splits the images into an SxS grid that it uses to predict whether the specific bounding box contains the object (or parts of it) and then uses this information to predict a class for the object. Before we can go into details and explain how the algorithm functions, we need to understand how the algorithm builds and specifies each bounding box. The YOLO algorithm uses four components and additional value to predict an output. 1. The center of a bounding box (bx by) 2. Width (bw) 3. Height (bh) 4. The Class of the object (c) The final predicted value is confidence (pc). It represents the probability of the existence of an object within the bounding box. The (x,y) coordinates represent the center of the bounding box. Typically, most of the bounding boxes will not contain an object, so we need to use the pc prediction. We can use a process called non-max suppression to remove unnecessary boxes with low probability to contain objects and those who share big areas with other boxes. LOCAL BINARY PATTERN It is a simple yet very efficient texture operator which labels the pixels of an image by thresholding the neighborhood of each pixel and considers the result as a binary number. Face detection, storing and retriving
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41232 | Volume – 5 | Issue – 4 | May-June 2021 Page 338 CONCLUSION This paper discuses about an AI based ATM security system by utilizing Open CV and YOLO. Thissystemuseslocal binary pattern algorithm to detect the faces and detect the crime. This system also has several features as if the person stands more than ten minutes the buzzer will ring and the photo will be sent to the administrator. This system is proposed to reduce the difficulty of officers to find the person. For the future we will develop the concept and add new features which would help the community even more. References [1] Durette, B., Louveton, N., Alleysson, D., and H´erault,J, 2008. Visuoauditory sensory substitutionfor mobility assistance: testing The VIBE.In Workshop on Computer Vision Applications for the Visually Impaired, Marseille, France [2] Hern´andez, A. F. R. et al, 2009. Computer Solutions on Sensory Substitution for Sensory Disabled People. In Proceedings of the 8th WSEAS International Conference on Computational Intelligence, Manmachine Systems and Cybernetics [3] Tang, H., and Beebe, D. J., 2006. An oral tactile interface for blindnavigation. IEEE Trans Neural Syst Rehabil Eng, pp. 116–123. [4] Auvray, M., Hanneton, S., and O’Regan, J. K., 2007. Learning to perceive with a visuo - auditory substitution system: Localisation and object recognition with ’The vOICe [5] Kannamma, M., Chanthini, B., Manivannan, D.: Controlling and monitoring process in industrial automation using Zigbee.In:57th IEEE International Conference on Advances in computing, Communications and Informatics (ICACCI), pp.5901- 5902.IEEE(2013) [6] Kim., Jaewoo., Jaiyong Lee., Yun, J.: M2M service platforms: survey issues, and enabling technologies. IEEE Communications Society(2013) [7] Kannan, P., MeenakshiVidya, P.: Design and Implementaion of Security Based ATM theft Monitoring system.01-07(2013)