| Literature DB >> 32679644 |
Sonain Jamil1, MuhibUr Rahman2, Amin Ullah3, Salman Badnava4, Masoud Forsat5, Seyed Sajad Mirjavadi5.
Abstract
Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently an open research issue for security provisioning companies. Recently, the problem has been addressed by a plethora of schemes. However, each plan has a limitation, such as extreme weather conditions and huge dataset requirements. In this paper, we propose a novel framework consisting of the hybrid handcrafted and deep feature to detect and localize malicious drones from their sound and image information. The respective datasets include sounds and occluded images of birds, airplanes, and thunderstorms, with variations in resolution and illumination. Various kernels of the support vector machine (SVM) are applied to classify the features. Experimental results validate the improved performance of the proposed scheme compared to other related methods.Entities:
Keywords: AlexNet; feature extraction; localization; malicious drones; public safety; surveillance
Mesh:
Year: 2020 PMID: 32679644 PMCID: PMC7412104 DOI: 10.3390/s20143923
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Intrusion of malicious drones.
Figure 2Audio and visual feature-based UAV detection system model.
Figure 3Mel Frequency Cepstrum Coefficients (MFCC) computational steps.
Figure 4Drone detection through AlexNet.
Figure 5Support vector machine (SVM).
Figure 6Dataset images.
Figure 7Spectrograms of audio samples. (a) Drone; (b) Bird; (c) Thunderstorm; (d) Plane.
Accuracy of the hand-crafted descriptors.
| Descriptor | Linear | Gaussian | Polynomial |
|---|---|---|---|
| HOG [ | 82.7% | 50.6% | 50.6% |
| LBP [ | 53.8% | 59.0% | 62.2% |
| GLCM [ | 74.4% | 72.4% | 73.1% |
| CJLBP [ | 75.6% | 50.6% | 50.0% |
| NRLBP [ | 50.6% | 51.3% | 50.0% |
| LTrP [ | 61.5% | 50.6% | 50.0% |
| LETRIST [ | 57.1% | 50.6% | 50.0% |
Classification results of convolutional neural networks (CNNs) using different kernels of SVM.
|
| |||
|
|
|
|
|
| Linear | 97.4% | 98.7% | 96.3% |
| Gaussian | 50.6% | 50.3% | 100.0% |
| Polynomial | 97.4% | 100.0% | 95.1% |
|
| |||
|
|
|
|
|
| Linear | 95.5% | 93.8% | 97.3% |
| Gaussian | 50.6% | 50.3% | 100.0% |
| Polynomial | 63.5% | 100.0% | 57.8% |
|
| |||
|
|
|
|
|
| Linear | 96.8% | 98.7% | 95.1% |
| Gaussian | 50.6% | 50.3% | 100.0% |
| Polynomial | 95.5% | 100.0% | 91.8% |
|
| |||
|
|
|
|
|
| Linear | 95.5% | 96.1% | 944.9% |
| Gaussian | 50.6% | 50.3% | 100.0% |
| Polynomial | 96.8% | 98.7% | 95.1% |
|
| |||
|
|
|
|
|
| Linear | 96.8% | 97.4% | 96.2% |
| Gaussian | 50.6% | 50.3% | 100.0% |
| Polynomial | 93.6% | 97.2% | 90.5% |
Figure 8Confusion matrix of AlexNet with different kernels of SVM. (a) Linear kernel; (b) Gaussian kernel; (c) Polynomial kernel.
Figure 9Drone localization steps.
Figure 10Malicious UAV localization.
Classification results of audio descriptors.
|
| |||
|
|
|
|
|
| Linear | 81.7% | 85.0% | 75.0% |
| Gaussian | 98.3% | 97.5% | 100.0% |
| Polynomial | 63.3% | 94.7% | 48.8% |
|
| |||
|
|
|
|
|
| Linear | 65.0% | 100.0% | 65.0% |
| Gaussain | 63.3% | 97.4% | 64.4% |
| Polynomial | 83.3% | 86.7% | 82.2% |
Figure 11Confusion matrix of MFCC through various kernels of SVM. (a) Linear Kernel (b) Gaussian Kernel (c) Polynomial Kernel.
Figure 12Accuracy of multiclass SVM for combined MFCC and AlexNet features.
Comparison of proposed method with existing methods.
| Ref No. | Audio Data | Image Data | Sample Approach | Accuracy |
|---|---|---|---|---|
| [ | √ | - | Deep Belief Network | 88.0% |
| [ | √ | - | Correlation | 70% |
| [ | √ | - | HMM | 81.3% |
| [ | √ | - | SVM with Genetic Algorithm | 95.0% |
|
|
|
|
|
|
| [ | - | √ | ResNet-50 | 96.8% |
| [ | - | √ | FD-HOG | 82.7% |
| [ | - | √ | LBP and HOG | 62.2% and 82.7% |
|
|
|
|
|
|
| [ | √ | √ | HOG and MFCC | 82.7% and 98.3% |
|
|
|
|
|
|
Figure 13Comparison of proposed UAV detection with conventional scheme and with schemes without using machine learning.