International Journal of Scientific and Research Publications, Volume 5, Issue 3, March 2015 1 ISSN 2250-3153 www.ijsrp.org A Client-Server Based Architecture for Intruder Detecting and Playing Safety Alarm System Md. Ariful Islam Khandaker * , Monika Gope ** * Institute of Information and Communication Technology, KUET, Bangladesh ** Institute of Information and Communication Technology, KUET, Bangladesh Abstract- The current world is rapidly growing depending on Information Technology. There is a most concern able issue, which is “Security”. Today’s world security necessity is extremely higher and sometimes it can be very expensive. Considering the “Security” of our daily life, this paper proposes architecture for physical intruder detecting and playing safety alarm system. In our application design, there is a web cam, which is connected to a client application program. The client application program always informs the server about any kind of bugler attack. Both client and server are connected using a well- established network .i.e. LAN, MAN and WAN. The web cam behaves as sensing device. Basically, it reads the environmental object status. Then image of web cam processes by a motion detection algorithm to detect, if there’s any motion or change of that object. This object motion is primary symptom of bugler attack. Index Terms- Motion detection, bugler attack, intruder detection, safety alarm I. INTRODUCTION nsuring security by costly and important devices are very challenging job. Detecting intruder is also another challenge to stop such criminal activities. The proposed architecture only uses are regularly used devices or easily available devices and added another services to us. So, this architecture is used as a security device. A webcam or CCTV is used to observe the environments of the object to ensure security. It can be set up in a sophisticated place to enhance the security. The system uses the webcam(s) to read the environmental status and if any kind of motion of objects is detected from webcam video image then it makes an alert to inform the environmental changes to the server using LAN, WLAN, MAN, WAN, PAN, intranet, internet etc. The security enhancing policy is simple. Whenever a motion of objects is detected in any client then client will send an appropriate signal to server. Server will save the data to keep the track and at the same time server will send to all clients this message. Then all clients will play alarming sound. The architecture can be used in bank security, home security, office space or sophisticated device security. II. LITERATURE REVIEW 2.1. Existing Work Considering our country, we use basically key-lock system, which is defends on mechanical technology and has no proper safety. 2.1.1 Mechanical Lock A lock is a mechanical fastening device which may be used on a door, vehicle, or container, restricting access to the area or enclosed property. Commonly, it can be released by using a key. 2.1.2 Keycard Lock Fig. 1. Keycard Lock. A keycard lock is a lock operated by a keycard with identical dimensions to that of a credit card or driver’s license. Keycard systems operate either by physically moving detainees in the locking mechanism with the insertion of the card or by reading digital data encoded on the card's magnetic strip. 2.1.3 RFID signal Fig. 2. RFID Signal. Radio-frequency identification (RFID) is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. 2.1.4 Key Code A key code is a series of alphanumeric characters to create a key. There are two kinds of key codes: blind codes and biting codes. 2.1.5 Fingerprint E