Research on the Recognition Method of Leaky Cable Intrusion Alarm Signal
- 10.2991/asei-15.2015.20How to use a DOI?
- leaky cable, perimeter intrusion detection, feature extraction, similarity matching
With the growing demand for security products, intrusion alarm system, based on leaky cables, is favored by majority of enterprises, with advantages of system stability, high concealment and installation location unlimited. Traditional intrusion detection method relies on signal amplitude threshold. However, this method is prone to produce false positives with complex environment interference and false negatives when the leaked electromagnetic field is weak. To solve this problem, this paper, by analyzing time and frequency domain features of the intrusion and interference signals, attempts to use a time-domain analysis method to recognize the intrusion signal. Then we research on how to establish the feature model of intrusion signal, and finally we propose an intrusion signal recognition algorithm based on similarity matching. Through identifying and verifying a large number of actual sample signals, results show that the similarity matching method can effectively reduce the false positives and false negatives, and improve the accuracy of alarm system.
- © 2015, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Teng Lu AU - Lei Xu PY - 2015/05 DA - 2015/05 TI - Research on the Recognition Method of Leaky Cable Intrusion Alarm Signal BT - Proceedings of the 2015 International conference on Applied Science and Engineering Innovation PB - Atlantis Press SP - 88 EP - 92 SN - 2352-5401 UR - https://doi.org/10.2991/asei-15.2015.20 DO - 10.2991/asei-15.2015.20 ID - Lu2015/05 ER -