Skip to main content

Smart Surveillance System and Prediction of Abnormal Activity in ATM Using Deep Learning

  • Conference paper
  • First Online:
Data Science and Network Engineering (ICDSNE 2023)

Abstract

Although surveillance cameras are used in ATM cells, we face some problems of robbery and theft at ATMs due to lack of security; however, the monitoring capacity of law enforcement agencies has not kept pace. ATM spoofing attacks can be carried out to break or damage the ATM by stealing the machine and taking cash from the ATM. To reduce this problem, we arm the ATM with a camera module mounted in the room to perform continuous video observation. The camera detects the human and his activity in the ATM and attempts to breach the ATM. It detects unusual activities and immediately sends an alert notification to the police. Therefore, the system handles the application developed to automate video surveillance and detect any potential criminal activity at ATMs. Therefore, in this work, abnormal behavior is observed using CNN and RNN in surveillance videos. These algorithms can be used to recognize faces, detect and track camera movements, and detect and identify the action required to prevent such activity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nazabal A, García-Moreno P, Artes-Rodríguez A, Ghahramani Z (2016) Human activity recognition by combining a small number of classifiers. IEEE J Biomed Health Inform 20

    Google Scholar 

  2. Ding C, Hong H, Zou Y, Chu H, Zhu X, Fioranelli F, Le Kernec J (2019) Continuous human motion recognition with a dynamic range-doppler trajectory method based on FMCW radar. IEEE Trans Geosci Remote Sens 57

    Google Scholar 

  3. Tao D, Lianwen J, Yuan Y, Xue Y (2016) Ensemble manifold rank preserving for acceleration-based human activity recognition. IEEE Trans Neural Netw Learn Syst 27

    Google Scholar 

  4. Rosique F, Losilla F, Navarro PJ (2021) Using artificial vision for measuring the range of motion. IEEE Lat Am Trans 19

    Google Scholar 

  5. Poh GS, Gope P; Ning J (2019) PrivHome: privacy-preserving authenticated communication in smart home environment. IEEE Trans Dependable Secur Comput 18

    Google Scholar 

  6. Zhang H, Zhou W, Parker LE (2015) Fuzzy temporal segmentation and probabilistic recognition of continuous human daily activities. IEEE Trans Hum-Mach Syst 45

    Google Scholar 

  7. Lu J, Tong K-Y (2019) Robust single accelerometer-based activity recognition using modified recurrence plot. IEEE Sens J 19

    Google Scholar 

  8. Wang L, Zhao X, Si Y, Cao L, Liu Y (2017) Context-associative hierarchical memory model for human activity recognition and prediction. IEEE Trans Multimed 19

    Google Scholar 

  9. Kishore PVV, Kumar DA, Sastry ASCS, Kumar EK (2018) Motionlets matching with adaptive kernels for 3-D Indian sign language recognition. IEEE Sens J 18

    Google Scholar 

  10. Raghavendra R, Raja KB, Busch C (2015) Presentation attack detection for face recognition using light field camera. IEEE Trans Image Process 24

    Google Scholar 

  11. Gnanavel S, Ramakrishnan S (2017) HD video transmission on UWB networks using H.265 encoder and ANFIS rate controller. Clust Comput J Netw Softw Tools Appl 21(1): 251–263

    Google Scholar 

  12. Gnanavel S, Ramakrishnan S, Mohankumar N (2014) Wireless video transmission over UWB channel using fuzzy based rate control technique. J Theor Appl Inf Technol 60(3):491–503

    Google Scholar 

  13. Gnanavel S, Sreekrishna M, Mani V, Kumaran G, Amshavalli RS, Alharbi S, Maashi M, Khalaf OI, Abdulsahib GM, Alghamdi AD et al (2022) Analysis of fault classifiers to detect the faults and node failures in a wireless sensor network. Electronics 11:1609

    Article  Google Scholar 

  14. Sakkarvarthi G, Sathianesan GW, Murugan VS, Reddy AJ, Jayagopal P, Elsisi M (2022) Detection and classification of tomato crop disease using convolutional neural network. Electronics 11:3618

    Article  Google Scholar 

  15. Gnanavel S, Narayana KE, Jayashree K, Nancy P, Teressa DM (2022) Implementation of block-level double encryption based on machine learning techniques for attack detection and prevention. Wirel Commun Mob Comput Article ID 4255220:9. https://doi.org/10.1155/2022/4255220

  16. Nagendiran D, Chokkalingam SP (2022) Real time brain tumor prediction using adaptive neuro fuzzy technique. Intell Autom Soft Comput 33(2):983–996

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Gnanavel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gnanavel, S., Duraimurugan, N., Jaeyalakshmi, M. (2024). Smart Surveillance System and Prediction of Abnormal Activity in ATM Using Deep Learning. In: Namasudra, S., Trivedi, M.C., Crespo, R.G., Lorenz, P. (eds) Data Science and Network Engineering. ICDSNE 2023. Lecture Notes in Networks and Systems, vol 791. Springer, Singapore. https://doi.org/10.1007/978-981-99-6755-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-6755-1_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-6754-4

  • Online ISBN: 978-981-99-6755-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics