The IoT is being created by Internet and billions of physical devices (IoT). These devices are producing more useful or meaningless data. This data must be prepared and transmitted, which is a difficult task. Future research directions and other IoT applications are also discussed. The security sector is undoubtedly one of the IoT framework's application areas. It is essential to a common little effort solution to prevent wrongdoing and guarantee the safety of individuals from the home, military, industry, and other settings. This study covers the depiction driven evolution procedure for AI Security System employing Raspberry Pi IoT setup. It makes note at end of the client’s expectation. Such kind of instance is to share the information and protect with the Internet of Things that are more dependent by having the methods of Artificial Intelligence which supports the level of proximity and some of the non-mistaken with an accuracy of 90 percent proof, and the major confirmation to be made here is being a part of this. This method utilizes the help of electric door that are striking the actuator and the USB type web camera with the example of Image-gathering. It is also a kind of application with a standard programming Interfaces to collect similar gaming plans which are to be more related with the Internet of Things which are based on boarding knowledge of Raspberry Pi and also the steganography type distribution.
Keywords
Artificial Intelligence, Machine Learning, Internet of Things, Webcam, USB.
M. M. Esmaeili, M. Fatourechi, and R. K. Ward, “A Robust and Fast Video Copy Detection System Using Content-Based Fingerprinting,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 213–226, Mar. 2011, doi: 10.1109/tifs.2010.2097593.
J. M. Barrios and B. Bustos, “Competitive content-based video copy detection using global descriptors,” Multimedia Tools and Applications, vol. 62, no. 1, pp. 75–110, Nov. 2011, doi: 10.1007/s11042-011-0915-x.
Jaap Haitsma and Ton Kalke. 2012. “A highly robust audio fingerprinting system”. In Proceedings of the International Symposium on Music Information Retrieval.107–115.
M. Jiang, Y. Tian, and T. Huang, “Video Copy Detection Using a Soft Cascade of Multimodal Features,” 2012 IEEE International Conference on Multimedia and Expo, pp. 374–379, Jul. 2012, doi: 10.1109/icme.2012.189.
Y. Lei, W. Luo, Y. Wang, and J. Huang, “Video Sequence Matching Based on the Invariance of Color Correlation,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 22, no. 9, pp. 1332–1343, Sep. 2012, doi: 10.1109/tcsvt.2012.2201670.
H. Liu, H. Lu, and X. Xue, “A Segmentation and Graph-Based Video Sequence Matching Method for Video Copy Detection,” IEEE Transactions on Knowledge and Data Engineering, vol. 25, no. 8, pp. 1706–1718, Aug. 2013, doi: 10.1109/tkde.2012.92.
J. Song, Y. Yang, Z. Huang, H. T. Shen, and J. Luo, “Effective Multiple Feature Hashing for Large-Scale Near-Duplicate Video Retrieval,” IEEE Transactions on Multimedia, vol. 15, no. 8, pp. 1997–2008, Dec. 2013, doi: 10.1109/tmm.2013.2271746.
K. Taşdemir and A. E. Çetin, “Content-based video copy detection based on motion vectors estimated using a lower frame rate,” Signal, Image and Video Processing, vol. 8, no. 6, pp. 1049–1057, Mar. 2014, doi: 10.1007/s11760-014-0627-6.
P. Karthika and P. Vidhyasaraswathi, “Digital Video Copy Detection Using Steganography Frame Based Fusion Techniques,” Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB), pp. 61–68, 2019, doi: 10.1007/978-3-030-00665-5_7.
A. BenHajyoussef, T. Ezzedine, and A. Bouallègue, “Gradient-based pre-processing for intra prediction in High Efficiency Video Coding,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, Jan. 2017, doi: 10.1186/s13640-016-0159-9.
P.-Y. Lin, B. You, and X. Lu, “Video exhibition with adjustable augmented reality system based on temporal psycho-visual modulation,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, Jan. 2017, doi: 10.1186/s13640-016-0160-3.
I. Batioua, R. Benouini, K. Zenkouar, and H. E. Fadili, “Image analysis using new set of separable two-dimensional discrete orthogonal moments based on Racah polynomials,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, Mar. 2017, doi: 10.1186/s13640-017-0172-7.
B.-Y. Sung and C.-H. Lin, “A fast 3D scene reconstructing method using continuous video,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, Feb. 2017, doi: 10.1186/s13640-017-0168-3.
Y. Cai, Y. Lu, S. H. Kim, L. Nocera, and C. Shahabi, “Querying geo-tagged videos for vision applications using spatial metadata,” EURASIP Journal on Image and Video Processing, vol. 2017, no. 1, Feb. 2017, doi: 10.1186/s13640-017-0165-6.
N. Nan and G. Liu, “Video Copy Detection Based on Path Merging and Query Content Prediction,” IEEE Transactions on Circuits and Systems for Video Technology, vol. 25, no. 10, pp. 1682–1695, Oct. 2015, doi: 10.1109/tcsvt.2015.2395771.
VidhyaSaraswathi.P and M. Venkatesulu, "A Secure Image Content Transmission using Discrete chaotic maps" Jokull Journal, Vol.63, No.9,pp.404-418,September-2013.
Y. A. V. Phamila and R. Amutha, “Discrete Cosine Transform based fusion of multi-focus images for visual sensor networks,” Signal Processing, vol. 95, pp. 161–170, Feb. 2014, doi: 10.1016/j.sigpro.2013.09.001.
O. Prakash, R. Srivastava, and A. Khare, “Biorthogonal wavelet transform based image fusion using absolute maximum fusion rule,” 2013 IEEE Conference on Information And Communication Technologies, pp. 577–582, Apr. 2013, doi: 10.1109/cict.2013.6558161.
K. Sharmila, S. Rajkumar, and V. Vijayarajan, “Hybrid method for multimodality medical image fusion using Discrete Wavelet Transform and Entropy concepts with quantitative analysis,” 2013 International Conference on Communication and Signal Processing, pp. 489–493, Apr. 2013, doi: 10.1109/iccsp.2013.6577102.
L. Liu, H. Bian, and G. Shao, “An effective wavelet-based scheme for multi-focus image fusion,” 2013 IEEE International Conference on Mechatronics and Automation, pp. 1720–1725, Aug. 2013, doi: 10.1109/icma.2013.6618175.
R. Mahmoud, T. Yousuf, F. Aloul, and I. Zualkernan, “Internet of things (IoT) security: Current status, challenges and prospective measures,” 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 336–341, Dec. 2015, doi: 10.1109/icitst.2015.7412116.
CRediT Author Statement
The authors confirm contribution to the paper as follows:
Conceptualization: Karthika P and Balamurali S;
Methodology: Balamurali S;
Software: Karthika P;
Data Curation: Karthika P and Balamurali S;
Writing- Original Draft Preparation: Balamurali S;
Visualization: Karthika P and Balamurali S;
Investigation: Karthika P and Balamurali S;
Supervision: Balamurali S;
Validation: Balamurali S;
Writing- Reviewing and Editing: Karthika P and Balamurali S;
All authors reviewed the results and approved the final version of the manuscript.
Acknowledgements
Author(s) thanks to Dr. Balamurali S for this research completion and support.
Funding
No funding was received to assist with the preparation of this manuscript.
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Availability of data and materials
Data sharing is not applicable to this article as no new data were created or analysed in this study.
Author information
Contributions
All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.
Corresponding author
Karthika P
Department of Computer Applications, Kalasalingam Academy of Research and Education, Krishnan Koil, Viruthunagar, Tamil Nadu, India.
Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/4.0/
Cite this article
Karthika P and Balamurali S, “Enhancement of a Machine Learning Allocation with Video Copy Detection using IoT with Steganography for Raspberry Pi”, Journal of Machine and Computing, pp. 890-899, April 2025, doi: 10.53759/7669/jmc202505070.