Academia.eduAcademia.edu

Border security and surveillance System using IoT

2022, International Journal of Information Retrieval Research

Security along the international border is a critical process in security assessment; It must be exercised the 24x7. With the advancements in wireless IoT technology, it has become much easier to design, develop and deploy a cost-effective, automatic and efficient system for intrusion detection in the context of surveillance. This paper set up to set up the most efficient surveillance solution, we propose a Border Surveillance Systems and sensitive sites. this surveillance and security system is to detect and track intruders trespassing into the monitoring area along the border, it able which triggers off precocious alerts and valuation necessary for the catch of efficient measurements in case of a threat. Our system is based on the classification of the human gestures drawn from videos envoy by Drones equipped with cameras and sensors in real-time. All accomplished experimentation and acquired results showed the benefit diverted from the use of our system and therefore it enables o...

International Journal of Information Retrieval Research Volume 12 • Issue 1 Border Security and Surveillance System Using IoT Siham Boukhalfa, GeCoDe Laboratory, University of Saida Dr. Moulay Tahar, Algeria Abdelmalek Amine, GeCoDe Laboratory, University of Saida Dr. Moulay Tahar, Algeria https://orcid.org/0000-0001-9327-7903 Reda Mohamed Hamou, GeCoDe Laboratory, University of Saida Dr. Moulay Tahar, Algeria https://orcid.org/0000-0002-0388-1275 ABSTRACT Security along the international border is a critical process in security assessment. It must be exercised 24-7. With the advancements in wireless IoT technology, it has become much easier to design, develop, and deploy a cost-effective, automatic, and efficient system for intrusion detection in the context of surveillance. This paper sets up the most efficient surveillance solution. The authors propose a border surveillance system. This surveillance and security system is to detect and track intruders trespassing into the monitoring area along the border which triggers alerts and valuation necessary for the catch of efficient measurements in case of a threat. The system is based on the classification of the human gestures drawn from videos envoy by drones equipped with cameras and sensors in real-time. All accomplished experimentation and acquired results showed the benefit diverted from the use of the system, and therefore, it enables the soldiers to watch the borders at each and every moment effectively and at low cost. KeywoRdS Barrier Coverage, Border Control, Border Patrol, Border Security System, Border Surveillance, Drone, Remote Surveillance System, Security, Security Alarm, Video Surveillance 1. INTRodUCTIoN ANd PRoBLeMATIC The security of borders plays a key role in the assertion of national security, management of lawful immigration, prevention of smuggling, and defense against hostile threats. It is necessary to avoid hostile intrusions, the fluxes of underground immigrants, and the traffic linked by the conductors. Indeed, borders remain the most visible mark of a state’s sovereignty over a territory, and their management of its involvement in protecting its people from threats it defines as such: international terrorism, smuggling, organized crime, irregular migration, and multifaceted trafficking (human beings, drugs, raw materials or ALPC). Border threats differ from country to country, so each of the neighboring countries has developed its own structure for border guard units. DOI: 10.4018/IJIRR.289953 This article published as an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) which permits unrestricted use, distribution, and production in any medium, provided the author of the original work and original publication source are properly credited. 1 International Journal of Information Retrieval Research Volume 12 • Issue 1 However, they notice that a typical resolution for the surveillance of borders consists in putting towers of observation, of post offices of security and organizing patrols of surveillance to discern possible illegal movements of persons or vehicles in the area around border, to accomplish a big variety of missions: observation, detection and tells real-time about the slightest changeability the centers of command and control For this we propose a surveillance system to combat terrorism, smuggling, organized crime, and irregular migration, it is designed to ensure the missions of permanent control or temporary border or camp protection, bivouac, sensitive site, convoy route. The system allows continuous operation under “complex and demanding” conditions, without putting lives in danger, and which helps armies and governments to manage changes at the level of threats. The Internet of Things (IoT) is a developing worldview that enables communication among sensors and electronic gadgets through the Internet to facilitate our lives. IoT utilize smart devices and internet to give creative answers for different difficulties and issues (Kumar and Tiwari, 2019). The structure of our system depends on connections between objects (sensors, drones, and surveillance cameras) that they give capacities to control by the center of command (which can be far from borders) before it is too late. Nature is vast, it is a powerful source of inspiration for solving complex computer problems, she always finds the optimal solution to solve her problem and maintains the perfect balance between its components, an interesting new paradigm known as the bio-inspired consists in analyzing the living world in order to translate biological models of all forms (animals, plants, micro-organisms, ecosystems... etc.) into technical and algorithmic concepts, many works have been done in the field of bio-inspiration to solve different problems and others are still in progress, the main issue in this work is the creation of a new bio-inspired technique that can enhance security while respecting the privacy of human beings represents. In this work is we use a bio-inspired model based on the style of life of the Cockroaches for the purpose of detect terrorists and non-soldier people by the characteristics of gestures which are intruders of being dangerous (criminals, terrorists… etc.) instead of the faces. The technique is based on the connections between smart objects in which is based on picking up pictures through drones equipped with cameras that are able to connect with smartphones So that it can monitor borders from any place and the use of the characteristics of gestures that are suspected of being dangerous instead of the faces. We apply the classification of gestures human being by the Bio-Inspired technique of Grouping Cockroaches Classifier (GCC) based on the style of life Cockroaches and operate on the phenomenon of seeking the most attractive and secure place (shelter) for hiding for a good detected the gesture of unwanted individuals this algorithm is based on a learning base and classify the gestures of the test base and labels them, each gesture take one of two classes (gestures of border soldiers and gesture of terrorists and non-soldier people), and we apply also a new technology for the presentation of picture (n-grams pixels) to construct a system of control of borders. Our objective is to use drones instead of normal soldiers to cover the space of the borders, detect terrorists hiding their faces, detect people in disguise; react effectively and faster, react at night, or even when the climate is difficult. We began our work with some related works done in this field, after that in the third section we detailed description of our system, which will be followed by a presentation of experiment. 2. ReLATed woRKS In the conventional solution of controlling border traveling (that the person is eligible to enter the country and does not pose a threat to its citizens or institutions) the border guards have the responsibility for this monitoring takes place manually which are responsible for continuously keeping an eye on the borders. It takes a lot of manpower and assets as the borders are stretched across hundreds of miles and have extreme terrain as well as climatic conditions. With the improvement of document forging techniques, the uses of look-alikes and aliases, as well as the time pressure associated to border control processing, it is not surprising that border control authorities are revising the traditional 2 International Journal of Information Retrieval Research Volume 12 • Issue 1 manual approach and considering the deployment of the most advanced surveillance technologies to facilitate a more efficient and reliable controlling of cross-border travels. Nowadays, several works have been done in the field of security surveillance for the border, military, and academic purposes. Palak et al (Palak and Himani, 2019) provided a survey of different Methods in Border Security and Surveillance, The aim is to compare different researches in border security. Arfaoui et al (Arfaoui and Boudriga, 2017) developed a model that estimates the crossing time of the monitored area taking into account the characteristics of the area and the behavior of the intruders crossing this area. Then they proposed a deployment method based on the intruders crossing paths that optimize the number of deployed sensors while ensuring an early and high detection level of the intruders. Laura et al (Laouira, Abdelli, 2019) proposed a multilayer hybrid architecture based on cameras, scalar sensors, radars, and UAVs to design a border surveillance system. Bhadwal et al (Bhadwal and Madaan, 2019) proposed a smart border surveillance system that can provide round the clock video surveillance at the places where human deployment is not possible. Al Abkal et al (Al Abkal and Talas, 2020) investigates the use of drones, in border security and their ability to enhance existing security measures in Kuwait’s ports and borders and also along borders of the United States. The study contributes to practice by introducing the use of UAVs to enhance port security, especially for monitoring and surveillance purposes. Segireddy et al (Segireddy and Koneru, 2020) developed a light detection and ranging (LIDAR) sensor for the acquisition of distance with a range of 40 m from the position where an object resides. Data collected by the sensor is monitored and administered in a server. Software required for the analysis of data and generation of alert notifications is deployed in the server which is an added feature to the system and assists the concerned security personnel to respond quickly and engage the safety. Ayush et al (Goyal and Anandamurthy, 2020) employ machine learning techniques in Remote Video Surveillance for real-time threat level detection and classification of targets crossing borders. The algorithm used for the machine learningbased detection of objects in the videos in this research is the Viola-Jones algorithm. A threat level classifier and alert warning system were also added to classify and annotate the videos in real-time for each frame. The threat level classifier performs four-fold categorization of the real-time video into safe, low, medium, and high (danger). The alert warning system specifies the type of warning based on the type of intrusion (human, vehicle, or weapon) detected. Kim et al (Kim and Lim, 2018) propose to develop a drone-aided border surveillance system with electrification line battery charging systems (DABS-E). This paper proposes an optimization model and algorithm to schedule drone flights for a DABS-E. Through a numerical example. Karthick et al (Karthick and Prabaharan, 2019) proposed an architecture that involves a low energy intrusion detection system on the first level. If the system detects any unusual event, it initiates a secondary authentication unit. This is again a sensor that detects the traces of the event. If the second sensor detects the same, it authenticates the event and switches ON the wireless camera. This system has multiple advantages like reduced power consumption, improved event detection accuracy, longer life span, and enhanced information clarity. D. Arjun et al (Arjun and Indukala, 2017) describes in his paper the current Wireless Sensor Network (WSN) techniques related to border surveillance and intruder detection. Harish Bhaskar (Bhaskar, 2012) proposed integration of simultaneous detection, following, and face-acknowledgment based identification of human targets from a static camera is proposed. The precision, effectiveness, and heartiness of the proposed work are assessed and illustrated over different standard datasets over a wide scope of scenarios utilizing appropriate performance metrics. Jun He et al (He and Fallahi, 2011) demonstrate an ad-hoc WSN system for border surveillance. The network consists of heterogeneously autonomous sensor nodes that distributively cooperate with each other to enable a smart border in remote areas. This work also presents algorithms designed to maximize the operating lifetime of the deployed sensor network. 3 International Journal of Information Retrieval Research Volume 12 • Issue 1 3. BoRdeR ANd SeNSITIVe SITe SURVeILLANCe To meet the requirements of a border control policy that meets the needs of territorial security and enhanced deterrence against potential irregular migrants and to strengthen internal security and the fight against terrorism and organized crime and other illegal activities such as trafficking, illicit trafficking of migrants at the same time to facilitate the legitimate movement of persons and goods, while maintaining border security and protecting the privacy of individuals, we had the idea to model a system that will make it possible to better control movements at borders and to better manage migrations, which autonomously detects unwanted individuals through gestures and not their facial recognition while protecting the privacy of individuals. In our contribution, we assume that all the people that the drones equipped with cameras capture in the filmed area can be classified into two classes: gestures of border soldiers and gesture of terrorists and non-soldier people, our system is characterized by the following properties: • • • • The ability to protect the privacy of individuals to the general public. A person who does not have access can only see the private information (face and body) of the people. Initially, all the people filmed are considered “in good faith” and they are masked. Once a person is detected as unwanted individuals then that person’s private information is automatically unmasked. The original video can be retrieved by persons with authorized access who are usually the authorities with special security clearances. For example, border guards can have access to data and with a private key can retrieve original videos to solve an investigation. Detect unwanted individuals through their gestures even if they hide their faces or change their look by disguising themselves. The automatization of the detection of the different situations of risk and to help the border guards to make decisions appropriated to ameliorate the control of the border. In the literature, the systems proposed in section 2 have a flaw is that they do not ensure the privacy of all people since they allow hidden only privacy information for certain authorized persons and known in advance. These systems cannot be used in public places where they can be placed only in restricted and refined areas. The objective of our offered system is to assure private life not only for some allowed person but for all persons. For it, we used human gestures (instead of facial recognition) to discern if a person is undesirable or not to conceal all persons. The general architecture of the proposed system is shown in the following figure. As shown in the figure above, the cameras integrated or added to the drone represent the main elements of each surveillance system. They are used to cover the entire area of interest and provide a global and detailed view to track objects and extract additional information, for example, the class of an object (person, car, truck). 3.1 object detection This module consists of identifying objects in an image. This requires a segmentation step to partition a digital image into several groups (pixel set). Each group is supposed to correspond to an object in the image. In a video surveillance scenario, the goal is to separate the areas of the scene that belongs to the background from the regions belonging to the foreground namely the moving objects. For this step, a background subtraction algorithm is used that can provide real-time results to automatically generate the silhouette of human actions presented in video image sequences, where the data from each camera is processed by the following two steps: • 4 Background modeling: This step is implemented by creating a model that represents the regions of the scene that remain constant over time. For this, we propose the use of the Gaussian statistical International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 1. General architecture of the system for Surveillance of Borders and sensitive sites based on gestures • model since it gives precise results in real-time compared to the other background subtraction methods (Hu and Tan, 2004). Extracting objects from the foreground: Once the background pattern is calculated, the foreground objects are detected by calculating the difference between the original image and the background pattern as shown in the following figure. The output of this operation is a binary mask called foreground image containing objects that move in the filmed area. Figure 2. An example of background subtraction and extraction silhouettes of foreground objects moving in three different images 5 International Journal of Information Retrieval Research Volume 12 • Issue 1 3.2 Identification of Human objects This module aims to classify interesting objects in the field of vision of the camera (s) since in our work we are interested only by the movement of humans. For this reason, it is necessary to label each moving object to distinguish humans from other objects. The entry of this step is the silhouettes of moving objects extract from the images (video sequence) by the previous step. In this case, we are faced with a supervised classification problem since the purpose is to classify each moving object in one of two classes (person and other objects) using pre-classified images by an expert as learning data. For the realization of this stage, we can to complete this step we can follow a two-step process: • • Binary image preprocessing: This step detailed in section 3.3.1, is to transform each bit mask (foreground object image) to a vector. Object classification: We used the k-nearest neighbors (KPPV) algorithm, which requires the presence of a learning base consisting of images pre-classified by an expert (each image is a binary mask containing the silhouette of an object). Afterwards, a distance is calculated between each new image to be classified with each frame of the learning base. 3.3 detection of Undesirable Persons Once the silhouette of the object in an image is labeled as a person then we analyze this object in order to detect whether it is an undesirable persons or not through its gesture present by the silhouette. The classification of human gestures is a problem of binary classification (undesirable human gesture and border soldier’s gesture). For the realization of this module the algorithms of supervised classification can be used where we applied the classifier of the artificial cockroaches detailed in section 3.3.2 after a stage of vectorization of each gesture of a human realized by the pretreatment process (see section 3.3.1). On the other hand if the object detected is not a human then nothing will be reported. 3.3.1 Preprocessing of Binary Images When the data entered into our software are binary images then the pre-processing steps are as follows: • • Extraction of Matrices: Pixels in our pictures are in color RBG, therefore for the extraction of the matrix we compare the stocks RBG of every pixel with the stocks RBG of color black (R = 255, G = 255, B = 255) and white (R = 0, G = 0, B = 0). If it am black we shall replace RGB with zero, otherwise we shall replace it with one. Finally, we shall stock every matrix in a text file. Pseudo code 1 encodes according to sums up this stage. Representation by N-gram pixel: We had the idea of representing N-Gramme pixels, trying to mimic the representation N-gram characters. Each binary matrix of an image (built from the previous phase) is considered a text and each pixel is taken as a character and we follow the same instructions of the N-gram character technique. The basic principle is that two images are similar if they carry the same elements (N-gram pixels). This step ensures the transition of each image to a set of small units called N-Gram pixels. Figure 3. The preprocessing steps for binary images (black and white) 6 International Journal of Information Retrieval Research Volume 12 • Issue 1 Pseudo code 1. Binary Matrix Extraction 3.3.2 Grouping Cockroaches Classifier (GCC) • • The Origin of the Algorithm: We used the studies carried out by Bell on the social life and behavior of cockroaches in (Bell and Roth, 2007). The Inspiration Source: GCC is inspired by the natural behavior of cockroaches and the phenomenon of seeking the most attractive and secure place (shelter) for hiding. We can identify different types of cockroaches in our work, we are interested by the cockroaches that live in apartments, which are fertile and they are never isolated. This phenomenon is well detailed in an experiment conducted by French biologists when they met a group of cockroaches in a basin where there’s light everywhere, and they built two artificial shelters (shelter is a place with less brightness as shown in the figure) using two red circles because cockroaches do not observe the color red as shown in the following figure (Figures 4 and 5). The groping of cockroaches under the same place (Bell and Roth, 2007). From previous experience it was observed that cockroaches have a choice of two shelters to hide where they always choose the most secure shelter. A biological model explaining this phenomenon is presented by the following: Figure 4. Description of the experience 7 International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 5. The groping of cockroaches under the same place (Bell and Roth, 2007) • • Random Displacement of Cockroaches: Initially cockroaches will move randomly in all directions (exploration phase) as demonstrated in Figure 4.b. When a cockroach finds an attractive shelter, it hides and sends pheromones as smell to its congeners. The movement of cockroaches is guided by a set of displacement rules: ◦ The Darkness Shelters: Cockroaches are attracted by the darkest places like corners and shelters with less brightness. The degree of darkness plays a very important role for the quality security of each shelter. ◦ The Congener’s Attraction: Each cockroach seeks shelter where there are more of its congeners (cockroaches from the same colony) to hide it. ◦ The Security Quality: Cockroaches positioned in the middle of the shelter have a higher safety compared with cockroaches positioned at the border of the shelter. General Processes: In the supervised classification problem the data set is divided into two bases (learning basis and test basis). Each new instance (cockroach) well be classified (hidden) in a class (shelter) using a security function that is based on the attractiveness of each class (calculated using the aggregation operators (shelter darkness, congeners attraction and the quality of security), and the displacement probability (calculated using the naive Bayes algorithm). the general process of the GCC is illustrated in the next figure. The general architecture of Grouping Cockroaches Classifier (GCC) is illustrated in Figure 6 and each stage of its operation is described below. The vectorization of the data carried out according to the process detailed in section 3.3.1. 1. The Darkness Shelters: The Darkness Shelters calculates the rate of darkness in each shelter that represents the number of instances belonging to each class (shelter) relater à relative to the total number of instances in all classes. Initially, the cockroaches of the learning base are hidden in each corresponding shelter (we know the instances classes of the learning basis): OA ( Si ) = ◦ ◦ ◦ 8 CSi #CL (1) CSi: The number of instances belonging to the class Si (the number of cockroaches in the shelter). #CL: The total number of instances in all classes (the total number of cockroaches in the shelter). OA ( S i ): The darkness rate of the shelter Si . International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 6. The general functioning of Grouping Cockroaches Classifier (GCC) 2. The Congeners Attraction (CA): As shown in equation III.2, The CA is defined by a parameter K fixed in advance, and for each new instance classifying Cn, we randomly select k instances (designated as k congeners for the cockroach Ci in the shelter Si) of each class. Then, the total number of instances belonging to this class divides the sum of the distances between this instance and its K congeners: CA (C n , Si ) = ∑ K distance (C n ,C K Si ) K =1 #CSi (2) ◦ ◦ 3. CKSi : The Kem nearest neighbour instance cn in the class Si. Distance (Cn, CK Si) : The distance between the instances to be classified Cn and its k nearest neighbors in the class Si. ◦ K : The number of selected instances. ◦ CSI : The total number of instances in the classes S. The Security Quality: A cockroach must be in good condition to stay in a shelter and it has a maximum quality of security when it is close to the middle of the shelter. The security quality of the instance Cn in a class Si is calculated through equation III.3: QS (C n , Si ) = distance (C n , BSi ) ◦ (3) BS i : The centroid of the class Si . 9 International Journal of Information Retrieval Research Volume 12 • Issue 1 4. Shelter Attraction: We use the results of the previous aggregation operators to calculate the attraction of each class for each instance as follows: SA (C n , Si ) = ◦ 5. α ∗ OA (Si ) β ∗ CA (C n , Si ) + λ ∗ QS (C n , Si ) α, ß et ʎ: The Adjustment coefficients to adjust the impact of each operator in calculating the attractiveness of each class. Probability of displacement: For this, to calculate this probability we used the naive Bayes algorithm. Bayes’ theorem provides a way to assign each instance a probability for each possible class. He assumed that the effect of the value of a predictor (xn) on a given class (Si) is independent of the values of other predictors. the probability of each instance to be classified in a class Si is calculated by the next equation: P (Si / Cn ) = P(x1, Si)* P(x2, Si)*…*P(Si) ◦ ◦ ◦ 6. (4) (5) P (Si | Cn): The posterior probability is the probability that the instance Cn is classified in the class (Si). P (Si): Is the prior probability of the class Si. P (x | Si): Is the probability that component x generates the class Si. The security function: The cockroach always belongs to the most attractive shelter where it is more likely to reach it (each new instance will be classified in the most attractive class where it has more probability). For this, we used the security function f (Ci, Si) which allows us to find the most appropriate class for each instance (the most secure Si shelter for each cockroach Cn). The final decision concerning the class of each instance is done following the value of the security function: f(C n , Si ) = SA (Cn, Si ) + P (Si / Cn ) ◦ SA (Ci, Si) : The attraction of the class Si for the instance Cn. ◦ P (Ci, Si) : The probability of the cockroach Ci to be classified in the class Si. (6) Each instance is classified in the shelter that has the highest value of the safety function. 7. 8. Update: After each iteration, we update the values of the aggregation rules and the probability of displacement for each instance, when a cockroach does not feel safe (instance is miss-classified), then it will look for another more secure shelter (we reclassify this instance again). The process is repeated until a stopping criterion. Stop criterion: The stopping criterion GCC is the number of iterations fixed in advance, or if the number of instances in each class remains the same for the iteration i and iteration i + 1. 3.4 Masking Normal People Once a person’s gesture in the binary mask is detected as border soldiers then that person’s face and body will be automatically hidden following the pixel coloring technique (Yang, 2003) as shown in 10 International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 7. Example of masking of a person using the pixel coloring approach that hides privacy details such as the face and body the next figure in order to hide his privacy information. On the other hand, if the person is detected as undesirable persons then his or her privacy information will not be hidden. 3.5 Alarm Our border surveillance system should be able to respond to specific events. Once a person is detected as unwanted then an alarm will be triggered. The goal is to tell the screening officers or users of this system that they are in a situation with an abnormal event and that you have to intervene by following in that person’s footsteps or trying to arrest that person. 3.6 original Video Recovery In the event that people detect by our system as a border soldiers to whom we have hidden their privacy information (face and body) have been involved in some evil or criminal behaviors, our system has the ability to provide original surveillance images when necessary. In this sense, our system can provide access to special authorities who have a secret key, such as border guards, who can observe all the information that has arrived in the guarded space. The simplest solution to this problem is to store a copy of the original encrypted surveillance video separately. 4. eXPeRIMeNTATIoN ANd ReSULTS 4.1 experiments Given that our system is primarily based on detecting people who cross the border illegally even if they hide their faces based on human gestures instead of facial recognition, we will only present the results experimental purposes for this part of the system only. Before we begin our experimental protocol, we must first determine the baseline data set used. 4.1.1 The MuHaivi Dataset 1. Video Clips: A significant body of human action video data has been collected using 8 Schwan CCTV cameras in a site with challenging lighting conditions. The cameras are located at 4 sides and 4 corners of a rectangular platform (Figure 8 and Table 1). These cameras are not automatically synchronized, but the video segments for each action/actor combination have been manually synchronized. There are 17 human action classes (Cj: C1, C2, ..., C17) as listed in Table 2 performed by 14 actors (Ak: A1, A2, .., A14). The video sequences contain a number 11 International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 8. View of the configuration of eight cameras used to capture actions in the blue action area (marked with white bands on the floor of the stage) (Singh and Velastin, 2010) Table 1. The names of the camera views used in the data record and the corresponding symbols used in Figure 8 (Singh and Velastin, 2010) 2. of image frames before the action takes place so as to allow background estimation algorithms sufficient time to model the background, if necessary (Singh and Velastin, 2010). Silhouettes Manually Annotated: The dataset provides a sub-set of data that has been (painstakingly) manually annotated. This of course reduces the size of the data available for “pure” action recognition. A detailed performance evaluation of state-of-the-art object detection algorithms using this small sub-set of data is currently underway with the view to select a robust method to compute these silhouettes automatically. This subset of manually annotated data consists of actions C1... C5, actors A1 and A4 and cameras V3 and V4, therefore a total of 5 x 2 x 2=20 actions. Samples of the manually obtained silhouettes are shown in Figure 5.3. Although actions C1... C5 are relatively elemental from a human point of view, they can still be decomposed further into primitive actions. (Singh and Velastin, 2010). They grouped the images of the actions as a class of images of the gestures of terrorists and nonsoldier people and on the other hand images of the actions of border soldiers gestures. The modified MUHAVI dataset is defined in Table 3. Each gesture-based unwanted person detection algorithm has as input learning data pre-classified by an expert (binary masks for gestures of unwanted persons and 12 International Journal of Information Retrieval Research Volume 12 • Issue 1 Figure 9. Views of all 8 cameras showing examples of measurements and actors sample camera symbols as in Figure 8 other for the actions of border soldiers). The following table represents the redistricting of the data used to conduct our tests (learning and test data). 4.2 Results and Analysis To test the Border surveillance module only, we used the Grouping Cockroaches Classifier (GCC) with iteration number 1 and weights of the aggregation rules (α=1, ß=1 and ʎ=1) as well as K=1. For this we applied the GCC to the muhaivi dataset detailed previously since it consists of a set of silhouettes of humans annotated manually which does not require testing the object detection and identification modules. Human beings. For validation of the results obtained, we used supervised measurements with the class of terrorists and non-soldier people as a positive class in the contingency matrix. We conducted different tests in order to analyze the performance of the GCC by studying the influence of each parameter. 13 International Journal of Information Retrieval Research Volume 12 • Issue 1 Table 2. The action class names used in the data record and the corresponding symnoles used in Figure 9 (Singh and Velastin, 2010) Figure 10. Examples of manually annotated silhouettes (Singh and Velastin, 2010) 14 International Journal of Information Retrieval Research Volume 12 • Issue 1 Table 3. Muhaivi dataset decomposition Number of learning images Number of test images Total Gestures of terrorists and non-soldier 200 314 514 Gestures of border soldiers 100 326 426 4.2.1 The Influence of Image Representation and Distance Measurement Before applying the GCC a process of vectoring the images is necessary. We have varied the value of the N parameter used by the N-grams pixel representation method in the pre-processing phase and each time we set a distance measurement to assess the quality of each output. The results are detailed in the following tables. In our contribution, the main idea is that two images are identical if the number of occurrences of each N-pixel in these two images are the same. After observing the results in Tables 4, 5 and 6 we noticed that: • • The Manhattan distance measurement gives the best results compared to the cosine and Euclidean distance validated by an f-measure=0.8804 and entropy=0.0897 (blue cases in Table 6) because our goal is to find the exact difference between the vector components. In other words, two gestures are different if the occurrence values of their vector components are distant from each other. The distance between Euclidean and Manhattan give good results in relation to the cosine distance because we are interested in the magnitude of the image and not only by the relative frequencies of the N-pixels in the images. The recall is always less than the accuracy given that the majority of cases are classified as a border soldiers gesture validated by the contingency matrix with FN=45 and VN=298 (the green cases of Table 6) because on the one hand malicious or criminal persons always try to hide their appearances and be as normal as possible and on the other hand the learning data we used does not aggregate all the gestures of terrorists and non-soldier people that may exist. We may also have a conflict in detection between border soldiers and undesirables person. Table 4. Undesirables person detection results based on human gestures using Euclidian distance and variation of the N parameter for N-grams pixel representation Evaluation Measures Contingency Matrix U Recall 2-gram 3-gram 0.7229 0.7675 Precision 0.8376 0.8743 F-Measure 0.776 0.8124 Entropy 0.1484 0.1174 5-gram 0.8184 0.8248 0.8862 0.8961 0.8506 0.859 0.107 0.0983 U TP FP N FN VN 227 44 87 282 241 35 73 291 257 33 57 293 259 30 55 296 79.53 83.125 N-Gram Pixel 4-gram N Success Rate 85.937 86.71 15 International Journal of Information Retrieval Research Volume 12 • Issue 1 Table 5. The detection results of undesirables people based on human gestures using cosinus distance and variation of the parameter N for the N-grams pixel representation Evaluation Measures Contingency Matrix U Recall 2-gram 3-gram 0.694 0.7006 Precision 0.767 0.7885 F-Measure Entropy 0.7289 0.2034 0.745 0.1873 5-gram 0.707 0.7197 0.8014 0.8071 0.7511 0.1774 0.7638 0.1729 U VP FP N FN VN 218 66 96 260 220 59 94 267 222 55 92 271 226 54 88 272 74.68 76.093 N-Gram Pixel 4-gram N Success Rate 77.03 77.81 Table 6. The detection results of illegal migrants based on human gestures using the Manhattan distance and variation of the parameter N for the representation of images Evaluation Measures Contingency Matrix Recall 2-gram 3-gram 0.799 0.8216 Precision 0.8655 0.8896 F-Measure 0.8308 0.8542 Entropy 0.125 0.104 5-gram • • • 16 0.8566 0.8503 0.9057 0.89 0.8804 0.8696 0.0897 0.1037 N VP FP N FN VN 251 39 63 287 258 32 56 294 269 28 45 298 267 33 47 293 84.062 86.25 N-Gram Pixel 4-gram U U Success Rate 88.59 87.5 Every time we increase the value of the N parameter, the results improve because the vectors will be made up of more components, making it possible to better differentiate between 2 images of any kind. For example the 2-gram pixels can generate only 4 components (00, 01, 10, and 11), the 3-gram pixels generates 8 components (001, 100, 010, 110, 111, 000,001, 011) and so on. In terms of success rates even though we will get a percentage of 88% but this is not enough as part of our goal since it means that it has a lot of false alarm report (border soldiers detect as undesirable people) and the private information of innocent people will be revealed to the normal public. In terms of entropy, the results are clearly performing as the accuracy is elevated because we did not use the normalization of images, which allowed getting less loss of information. International Journal of Information Retrieval Research Volume 12 • Issue 1 4.2.2 Comparative Study • Statistical Comparison: To give more reference to our results obtained, we have put in confrontation the best performance of our Classifier of Grouping Cockroaches (GCC) in the face of the problem of detection of illegal migrants based on gestures against the results of other algorithms that exist in the literature such as classical learning algorithms like the nearest Nearby K (KPPV) with K=1 and cosine distance and C4.5 decision trees that have been applied using the WEKA API that provides tools and libraries ready to be used directly. The results of this comparison are presented in Table 7. It should be noted in the table that the maximum value in the f-measure=0.8804 is obtained with the classifier of artificial cockroaches (blue cases) because it is based on different rule and property as (attraction of congeners, darkness of the shelter, the quality of safety, and the likelihood of travel). We also found that the convergence of this classifier takes a lot of time given the number of calculations and its complexity which requires several tests and comparisons. KPPV classifiers give almost similar results to GCC (the yellow cases in the table) because they are based on a direct and naïve operation using a distance measurement. On the other hand the bad results are obtained by the decision tree C4.5 method, because we are faced with binary images and the C4.5 is based on the gain of the ration and cannot identify the optimal root (prove in the literature). • Comparison in Terms of Services: What are the reasons for a good or poor performance of a video surveillance system for undesirable detection tasks? Table 7 compares our system with four other systems that exist in the literature (Drone-Aided Border Surveillance with an Electrification Line Battery Charging System (Kim and Lim, 2018), WSN-based Border Surveillance Systems(Arfaoui and Boudriga, 2017), An efficient WSN based solution for border surveillance (Laouira, Abdelli, 2019), Internet of Things based High Security Border Surveillance Strategy (Karthick and Prabaharan, 2019); Wireless IoT-Based Intrusion Detection Using LIDAR in the Context of Intelligent Border Surveillance System (Segireddy and Koneru, 2020)) from several angles such as: The preservation of the privacy of all undesirable persons: ◦ Automatic detection. ◦ The ability to detect undesirable people who hide their faces. ◦ The ability to retrieve original videos. ◦ Detect and unmask undesirable individuals automatically. ◦ Location of use. From the previous table, we note that our proposed system (the blue cases in Table 8) can be used in any location as it clearly meets all the requirements of a modern security policy by providing all services to ensure the safety of citizens and the government with the preservation of privacy. Unlike Table 7. Comparative study in terms of the quality of results of different classifiers for the detection of unwanted persons based on gestures Evaluation Measures Recall Classifiers Precision F-Measure Entropy Success Rate K nearest neighbors 0.8429 0.8681 0.853 0.1227 84 Decision tree C4.5 0.6497 0.7329 0.695 0.2306 67.2 Grouping Cockroaches Classifier 0.8503 0.89 0.8696 0.1037 87.5 17 International Journal of Information Retrieval Research Volume 12 • Issue 1 Table 8. Comparison in terms of services between our system and 4 other systems which exist in literature Our proposed system Drone-Aided Border Surveillance with an Electrification Line Battery Charging System (Kim and Lim, 2018) WSN-based Border Surveillance Systems (Arfaoui and Boudriga, 2017) An efficient WSN based solution for border surveillance (Laouira, Abdelli, 2019) Internet of Things based High Security Border Surveillance Strategy (Karthick and Prabaharan, 2019) Wireless IoTBased Intrusion Detection Using LIDAR in the Context of Intelligent Border Surveillance System (Segireddy and Koneru, 2020) Privacy Preservation Yes No No No No No Automatic detection with alarm Yes NO No Yes Yes Yes Detection of undesirable people who hide their faces Yes No No No No Yes Revelation of original videos for authorized persons Yes No No No No Yes Unmask undesirable people automatically Yes NO Yes No No No Place of use international border and sensitive site international border between countries international border between countries international border between countries international border international border other systems that exist in the literature where each of them has shortcomings especially in terms of privacy as well as their inability to detect people who hide their faces. 4.3 decisions 1. 2. 3. 4. 5. Every time we increase the N value of the N-gram pixel representation the results improve. The adaptation of the N-gram technique for the representation of binary images was a very interesting experience since it does not require the normalization of images and it is tolerant to the problems of incomplete images. The ideal configuration of the Grouping Cockroaches Classifier (GCC) is: a. 4-gram pixel as a method of representation. b. Manhattan as a measure of distance. The GCC gives better results than classifiers like the KPPV and C4.5 decision tree. The GCC takes a lot of time to run compared to other conventional learning algorithms. Our private detection system for undesirable’s persons provides many advantages in terms of quality of services compared to other video surveillance systems that exist in the literature. 5. CoNCLUSIoN ANd FUTURe woRK We introduced a méta-heuristic news of tattletale for the surveillance of borders through videos captured by one of the drones via sensors; this algorithm is inspired of work of researcher’s biologists who discovered the links of communication between the Cockroaches and their behavior. Acquired results are satisfactory and prove that algorithm is able of guaranteeing surveillance of borders. It gives better results in comparison with other algorithms existing in literature (k-means, tree of decision, C4.5), Validated by the measurements of valuation (recall, precision, Fr - Measure, entropy, rate 18 International Journal of Information Retrieval Research Volume 12 • Issue 1 of success, rate of error) We studied the impact of every parameter for the quality of performance of every algorithm to identify ideal. Finally, we can conclude that our contentment is full because targets fixed at the beginning were reached. For our future work, we will can extended this system for use on a larger scale then the system can be equipped with the mobile-based applications. Since IoT provides a global coverage, the data that is generated from the system can be accessed anywhere over the earth. Besides, we would like to propose to use an architecture based on deep learning in future work in order to improve our system. ACKNowLedGMeNT Authors would like to acknowledge the DGRSDT (Directorate General of Scientific Research and Technological Development under the authority of the Algerian Ministry of Scientific Research) for its support to this work and to the GeCoDe Laboratory. 19 International Journal of Information Retrieval Research Volume 12 • Issue 1 ReFeReNCeS Al Abkal, S., Talas, R. H. A., Shaw, S., & Ellis, T. (2020). The application of unmanned aerial vehicles in managing port and border security in the US and Kuwait: Reflections on best practice for the UK. International Journal of Maritime Crime and Security, 1(1). Arfaoui, I., Boudriga, N., Trimeche, K., & Abdallah, W. (2017). WSN-based Border Surveillance Systems Using Estimated Known Crossing Paths. MoMM2017. Arjun, D., Indukala, P. K., & Menon, K. U. (2017, April). Border surveillance and intruder detection using wireless sensor networks: A brief survey. In 2017 International Conference on Communication and Signal Processing (ICCSP) (pp. 1125-1130). IEEE. Bell, W. J., Roth, L. M., & Nalepa, C. A. (2007). Cockroaches: ecology, behavior, and natural history. JHU Press. Bhadwal, N., Madaan, V., Agrawal, P., Shukla, A., & Kakran, A. (2019). Smart Border Surveillance System using Wireless Sensor Network and Computer Vision. 2019 International Conference on Automation, Computational and Technology Management (ICACTM), 183-190. Bhaskar, H. (2012, September). Integrated human target detection, identification and tracking for surveillance applications. In 2012 6th IEEE International Conference Intelligent Systems (pp. 467-475). IEEE. Goyal, A., Anandamurthy, S. B., Dash, P., Acharya, S., Bathla, D., Hicks, D., & Ranjan, P. (2020). Automatic Border Surveillance Using Machine Learning in Remote Video Surveillance Systems. In Emerging Trends in Electrical, Communications, and Information Technologies (pp. 751–760). Springer. He, J., Fallahi, M., Norwood, R. A., & Peyghambarian, N. (2011, June). Smart border: ad-hoc wireless sensor networks for border surveillance. In Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X (Vol. 8019, p. 80190Z). International Society for Optics and Photonics. Hu, W., Tan, T., Wang, L., & Maybank, S. (2004). A survey on visual surveillance of object motion and behaviors. IEEE Transactions on Systems, Man and Cybernetics. Part C, Applications and Reviews, 34(3), 334–352. Karthick, R., Prabaharan, A. M., & Selvaprasanth, P. (2019). Internet of things based high security border surveillance strategy. Asian Journal of Applied Science and Technology, 3, 94–100. Kim, S. J., & Lim, G. J. (2018). Drone-aided border surveillance with an electrification line battery charging system. Journal of Intelligent & Robotic Systems, 92(3-4), 657–670. Kumar, S., Tiwari, P., & Zymbler, M. (2019). Internet of Things is a revolutionary approach for future technology enhancement: A review. Journal of Big Data, 6(1), 111. doi:10.1186/s40537-019-0268-2 Laouira, M. L., Abdelli, A., Othman, J. B., & Kim, H. (2019). An efficient WSN based solution for border surveillance. IEEE Transactions on Sustainable Computing. Segireddy, S., & Koneru, S. V. (2020). Wireless IoT-Based Intrusion Detection Using LIDAR in the Context of Intelligent Border Surveillance System. In Smart Intelligent Computing and Applications (pp. 455–463). Springer. Singh, S., Velastin, S. A., & Ragheb, H. (2010, August). Muhavi: A multicamera human action video dataset for the evaluation of action recognition methods. In 2010 7th IEEE International Conference on Advanced Video and Signal Based Surveillance (pp. 48-55). IEEE. Sood, P., Sharma, H., & Sehra, S. K. (2019). A Survey of Different Methods in Border Security and Surveillance. International Journal on Computer Science and Engineering, 7(10), 217–228. Yang, R. (2003). View-dependent Pixel Coloring: A Physically-based Approach for 2D View Synthesis (Doctoral dissertation). University of North Carolina at Chapel Hill. 20 International Journal of Information Retrieval Research Volume 12 • Issue 1 Abdelmalek Amine received an engineering degree in Computer Science, a Magister diploma in Computational Science and PhD from Djillali Liabes University in collaboration with Joseph Fourier University of Grenoble. His research interests include IoT, bigdata, data mining, text mining, ontology, classification, clustering, neural networks, and biomimetic optimization methods. He participates in the program committees of several international conferences and on the editorial boards of international journals. Prof. Amine is the head of GeCoDe-knowledge management and complex data-laboratory at UTM University of Saida, Algeria; he also collaborates with the “knowledge base and database” team of TIMC laboratory at Joseph Fourier University of Grenoble. Reda Mohamed Hamou received an engineering degree in computer Science from the Computer Science department of Djillali Liabes University of Sidi-Belabbes-Algeria and PhD (Artificial intelligence) from the same University. He has several publications in the field of BioInspired and Metaheuristic in many journals as IJAMC, IJIRR, IJAEC, IJALR, IJISP, IJIIT, JITR, IJCINI, IJOCI, IJSIR, IJSI, IJAEIS, IJDSST, IJBRA, Applied Intelligence. His research interests include Data Mining, Text Mining, Classification, Clustering, computational intelligence, neural networks, evolutionary computation and Biomimetic optimization method. He is a head of research team in GecoDe laboratory. Dr. Hamou is an associate professor in technology faculty in UTMS University of Saida-Algeria. 21