Open Access Open Access  Restricted Access Subscription or Fee Access

Automatic Integration of Ubiquitous Access Address in Camera Surveillance System Using Natural Language Processing


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/iremos.v14i1.19661

Abstract


One of the issues rarely discussed in the IP camera is the system's difficulties in accessing the IP camera from different manufacturers. This problem is caused by the fact that each IP camera has an individual manufacturing preset access addresses that make the users unable to integrate IP cameras from other manufacturers automatically. It is complicated to access ubiquitous IP cameras automatically in an advanced surveillance system. This research proposes a selection of IP camera access links using the NLP extraction approach. TF-IDF is one of the NLP extraction techniques used in this research, which has been combined with a statistical approach as a novel method in order to select the reliable candidate address from the address data of the IP camera provided by the ISPY dataset. The experiment has been conducted using several schemes based on the percentage of degradation of the original access address. There are four proposed links results, which are 242 links (25%), 288 links (50%), 363 links (75%), and 388 links (100%). The evaluation using 10-fold validation in several simulations reveals that the proposed list can produce the range around 89% to 97% of average accuracy. Moreover, brute force complexity evaluation has denoted that the selected access address has a lower complexity than the original one.
Copyright © 2021 Praise Worthy Prize - All rights reserved.

Keywords


Artificial Intelligence; NLP; Surveillance System; TF-IDF

Full Text:

PDF


References


N. Hassan, S. Gillani, E. Ahmed, I. Yaqoob, and M. Imran, The Role of Edge Computing in Internet of Things, IEEE Commun. Mag., vol. 56, no. 11, pp. 110–115, Nov. 2018.
https://doi.org/10.1109/mcom.2018.1700906

H. Guo and J. Heidemann, IP-Based IoT Device Detection, in Proceedings of the 2018 Workshop on IoT Security and Privacy - IoT S&P ’18, 2018, pp. 36–42.
https://doi.org/10.1145/3229565.3229572

R. Khan, S. U. Khan, R. Zaheer, and S. Khan, Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges, in 2012 10th International Conference on Frontiers of Information Technology, 2012, pp. 257–260.
https://doi.org/10.1109/fit.2012.53

Shidik, G., Kusuma, E., Nuraisha, S., Andono, P., Heuristic vs Metaheuristic Method: Improvement of Spoofed Fingerprint Identification in IoT Devices, (2019) International Review on Modelling and Simulations (IREMOS), 12 (3), pp. 168-175.
https://doi.org/10.15866/iremos.v12i3.17330

S. S. Gill, P. Garraghan, and R. Buyya, ROUTER: Fog enabled cloud based intelligent resource management approach for smart home IoT devices, J. Syst. Softw., vol. 154, pp. 125–138, 2019.
https://doi.org/10.1016/j.jss.2019.04.058

A. Tekeoʇlu and A. Ş. Tosun, Investigating security and privacy of a cloud-based wireless IP camera: NetCam, Proc. - Int. Conf. Comput. Commun. Networks, ICCCN, vol. 2015-Octob, 2015.
https://doi.org/10.1109/icccn.2015.7288421

J. Bugeja, D. Jönsson, and A. Jacobsson, An Investigation of Vulnerabilities in Smart Connected Cameras, 2018 IEEE Int. Conf. Pervasive Comput. Commun. Work. PerCom Work. 2018, pp. 537–542, 2018.
https://doi.org/10.1109/percomw.2018.8480184

I. P. Febin, K. Jayasree, and P. T. Joy, Violence detection in videos for an intelligent surveillance system using MoBSIFT and movement filtering algorithm, Pattern Anal. Appl., no. 0123456789, May 2019.
https://doi.org/10.1007/s10044-019-00821-3

H. Ahn, J. H. Lee, and H. J. Cho, Research of Panoramic Image Generation Using IoT Device with Camera for Cloud Computing Environment, Wirel. Pers. Commun., vol. 105, no. 2, pp. 619–634, 2019.
https://doi.org/10.1007/s11277-018-5972-2

Masroeri, A., Prananda, J., Sholahuddin, M., Motion Detection Simulation of Container Crane Spreader Using Computer Vision, (2019) International Review of Mechanical Engineering (IREME), 13 (8), pp. 438-446.
https://doi.org/10.15866/ireme.v13i8.16117

Y. Khazbak, J. Qiu, T. Tan, and G. Cao, TargetFinder: Privacy Preserving Target Search through IoT Cameras, Proc. Int. Conf. Internet Things Des. Implement. - IoTDI ’19, pp. 213–224, 2019.
https://doi.org/10.1145/3302505.3310083

Putra, O., Prianto, B., Prayitno, A., Setiawan, E., Yuniarno, E., Purnomo, M., A Novel Approach on Dehazing Volcanic Crater Lake Hazy Scene Videos Based on Color Attenuation Prior, (2017) International Review on Computers and Software (IRECOS), 12 (1), pp. 40-53.
https://doi.org/10.15866/irecos.v12i1.11735

Mahesa, R., Yudoko, G., Anggoro, Y., Intelligent Traffic Monitoring System as Part of Realizing Smart City-A Case Study: Traffic Engineering in Northern Jakarta’s Mixed-Use Area, (2020) International Review of Civil Engineering (IRECE), 11 (4), pp. 188-197.
https://doi.org/10.15866/irece.v11i4.18087

J. Myrans, R. Everson, and Z. Kapelan, Automated detection of fault types in CCTV sewer surveys, J. Hydroinformatics, vol. 21, no. 1, pp. 153–163, 2018.
https://doi.org/10.2166/hydro.2018.073

M. Hashemzadeh and A. Zademehdi, Fire detection for video surveillance applications using ICA K-medoids-based color model and efficient spatio-temporal visual features, Expert Syst. Appl., vol. 130, pp. 60–78, Sep. 2019.
https://doi.org/10.1016/j.eswa.2019.04.019

L. Du, W. Zhang, H. Fu, W. Ren, and X. Zhang, An efficient privacy protection scheme for data security in video surveillance, J. Vis. Commun. Image Represent., vol. 59, pp. 347–362, 2019.
https://doi.org/10.1016/j.jvcir.2019.01.027

D. Bhowmik, P. Garcia, A. Wallace, R. Stewart, and G. Michaelson, Power efficient dataflow design for a heterogeneous smart camera architecture, in 2017 Conference on Design and Architectures for Signal and Image Processing (DASIP), 2017, vol. 2017-Septe, pp. 1–6.
https://doi.org/10.1109/dasip.2017.8122128

R. Kunst, L. Avila, E. Pignaton, S. Bampi, and J. Rochol, Improving network resources allocation in smart cities video surveillance, Comput. Networks, vol. 134, pp. 228–244, 2018.
https://doi.org/10.1016/j.comnet.2018.01.042

C. Wang, K. Zhou, Z. Niu, R. Wei, and H. Li, LVFS: A Lightweight Video Storage File System for IP Camera-Based Surveillance Applications, in Information Sciences, vol. 281, 2018, pp. 189–199.
https://doi.org/10.1007/978-3-319-73600-6_17

M. L. Laouira, A. Abdelli, J. Ben Othman, and H. Kim, An efficient WSN based solution for border surveillance, IEEE Trans. Sustain. Comput., vol. XX, no. May 2018, pp. 1–1, 2019.
https://doi.org/10.1109/tsusc.2019.2904855

H. Tschofenig, Fixing User Authentication for the Internet of Things (IoT), Datenschutz und Datensicherheit - DuD, vol. 40, no. 4, pp. 222–224, Apr. 2016.
https://doi.org/10.1007/s11623-016-0582-1

M. A. Mikki, K. Lee, W. Kim, and K. Yim, Architecture to support heterogeneous devices for video surveillance system, Proc. - 2011 5th Int. Conf. Innov. Mob. Internet Serv. Ubiquitous Comput. IMIS 2011, pp. 16–19, 2011.
https://doi.org/10.1109/imis.2011.136

S. K. Parr and G. T. Gobbel, Considerations for advancing nephrology research and practice through natural language processing, Kidney Int., vol. 97, no. 2, pp. 263–265, Feb. 2020.
https://doi.org/10.1016/j.kint.2019.12.001

W. Zhang, T. Yoshida, and X. Tang, A comparative study of TF*IDF, LSI and multi-words for text classification, Expert Syst. Appl., vol. 38, no. 3, pp. 2758–2765, Mar. 2011.
https://doi.org/10.1016/j.eswa.2010.08.066

D. Kim, D. Seo, S. Cho, and P. Kang, Multi-co-training for document classification using various document representations: TF–IDF, LDA, and Doc2Vec, Inf. Sci. (Ny)., vol. 477, pp. 15–29, Mar. 2019.
https://doi.org/10.1016/j.ins.2018.10.006

J. Guo, Y. Mu, M. Xiong, Y. Liu, J. Gu, and J. Garcia-Rodriguez, Activity Feature Solving Based on TF-IDF for Activity Recognition in Smart Homes, Complexity, vol. 2019, 2019.
https://doi.org/10.1155/2019/5245373

IspyConnect, Camera Address, 2019. [Online- Accessed: 03-Mar-2019]. Available:
https://github.com/ispysoftware/iSpy/blob/master/XML/Sources.xml.

K. Ravi and V. Ravi, A survey on opinion mining and sentiment analysis: Tasks, approaches and applications, Knowledge-Based Syst., vol. 89, no. June, pp. 14–46, Nov. 2015.
https://doi.org/10.1016/j.knosys.2015.06.015

S. Kalra, L. Li, and H. R. Tizhoosh, Automatic Classification of Pathology Reports using TF-IDF Features, pp. 1–4, Mar. 2019.

I. Arroyo-Fernández, C.-F. Méndez-Cruz, G. Sierra, J.-M. Torres-Moreno, and G. Sidorov, Unsupervised Sentence Representations as Word Information Series: Revisiting TF--IDF, Comput. Speech Lang., vol. 56, pp. 107–129, Oct. 2017.
https://doi.org/10.1016/j.csl.2019.01.005

N. Shivasankaran, P. S. Kumar, and K. V. Raja, Hybrid Sorting Immune Simulated Annealing Algorithm For Flexible Job Shop Scheduling, Int. J. Comput. Intell. Syst., vol. 8, no. 3, pp. 455–466, May 2015.
https://doi.org/10.1080/18756891.2015.1017383

H. Harahsheh and M. Qatawneh, Performance Evaluation of Twofish Algorithm on IMAN1 Supercomputer, Int. J. Comput. Appl., vol. 179, no. 50, pp. 1–7, Jun. 2018.
https://doi.org/10.5120/ijca2018916654

S. Cabello and P. Giannopoulos, The Complexity of Separating Points in the Plane, Algorithmica, vol. 74, no. 2, pp. 643–663, Feb. 2016.
https://doi.org/10.1007/s00453-014-9965-6


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize